Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-5390 (GCVE-0-2018-5390)
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-05 05:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | Linux Kernel |
Version: 4.9 < 4.9* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:44.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:2785", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "name": "VU#962459", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/962459" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2776", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "name": "RHSA-2018:2933", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "USN-3763-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3763-1/" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "RHSA-2018:2948", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "1041434", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041434" }, { "name": "USN-3732-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3732-2/" }, { "name": "104976", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104976" }, { "name": "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "name": "1041424", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041424" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2924", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "name": "RHSA-2018:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "name": "DSA-4266", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4266" }, { "name": "RHSA-2018:2645", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "name": "USN-3732-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3732-1/" }, { "name": "RHSA-2018:2791", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "name": "RHSA-2018:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K95343321" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Linux Kernel", "vendor": "Linux", "versions": [ { "lessThan": "4.9*", "status": "affected", "version": "4.9", "versionType": "custom" } ] } ], "datePublic": "2018-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:59", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "RHSA-2018:2785", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "name": "VU#962459", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/962459" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2776", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "name": "RHSA-2018:2933", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "USN-3763-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3763-1/" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "RHSA-2018:2948", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "1041434", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041434" }, { "name": "USN-3732-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3732-2/" }, { "name": "104976", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104976" }, { "name": "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "name": "1041424", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041424" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2924", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "name": "RHSA-2018:2789", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "name": "DSA-4266", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4266" }, { "name": "RHSA-2018:2645", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "name": "USN-3732-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3732-1/" }, { "name": "RHSA-2018:2791", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "name": "RHSA-2018:2790", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K95343321" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" } ], "source": { "discovery": "UNKNOWN" }, "title": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2018-5390", "STATE": "PUBLIC", "TITLE": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux Kernel", "version": { "version_data": [ { "affected": "\u003e=", "version_affected": "\u003e=", "version_name": "4.9", "version_value": "4.9" } ] } } ] }, "vendor_name": "Linux" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2785", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "name": "VU#962459", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2776", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "name": "RHSA-2018:2933", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "USN-3763-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3763-1/" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "1041434", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041434" }, { "name": "USN-3732-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3732-2/" }, { "name": "104976", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104976" }, { "name": "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "name": "1041424", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041424" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2924", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "name": "RHSA-2018:2789", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "name": "DSA-4266", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4266" }, { "name": "RHSA-2018:2645", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "name": "USN-3732-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3732-1/" }, { "name": "RHSA-2018:2791", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "name": "RHSA-2018:2790", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_41", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "name": "https://support.f5.com/csp/article/K95343321", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K95343321" }, { "name": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", "refsource": "CONFIRM", "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "name": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2018-5390", "datePublished": "2018-08-06T20:00:00", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-08-05T05:33:44.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-5390\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2018-08-06T20:29:01.570\",\"lastModified\":\"2024-11-21T04:08:43.610\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.\"},{\"lang\":\"es\",\"value\":\"El kernel de Linux en versiones 4.9 y siguientes pueden forzarse a realizar llamadas muy caras a tcp_collapse_ofo_queue() y tcp_prune_ofo_queue() para cada paquete entrante, lo que puede conducir a una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBD7A51-0590-4DDF-8249-5AFA8D645CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF83BB87-B203-48F9-9D06-48A5FE399050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDC8561-5E0A-4692-BB71-C88ED7A1229F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C81647C-9A53-481D-A54C-36770A093F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9\",\"versionEndExcluding\":\"4.18\",\"matchCriteriaId\":\"D6E2A48A-1AFB-4878-AE78-18613DE9334F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0758920B-F8FC-44AB-92E3-CB0B0A5EDA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EBA79F-0ABF-4213-8BEF-9A927F9E24D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"364BE028-0C54-4254-9261-59D97C0EDC1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CD0194-46B1-4CCC-9829-8ED014B77660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2B91AF-ACE1-4F6F-B2D0-9D4B7D8D20CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30FBD992-DD41-441E-A6C7-D39DAC45DA34\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.7.1\",\"matchCriteriaId\":\"4A3E8408-DE01-4B3C-9FDF-A51261C524BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.0\",\"versionEndIncluding\":\"6.6.9\",\"matchCriteriaId\":\"0E49DB15-06E7-4709-933E-890A7E65A240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7.0\",\"versionEndIncluding\":\"6.7.5\",\"matchCriteriaId\":\"A29A8C01-7E4E-4662-B4F3-07DEF07CC600\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"41E6AF24-0676-4B70-A289-7B81321194DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"6BB42D3A-71EE-4367-9F65-86404D74E59D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"1331467F-B278-485E-AD91-7D0643C2F3DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E8F4B6-ACF1-4F2C-A2A4-DF7382CCE628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"195704A8-4911-4A61-8369-711D403052F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"E5011C2D-FBB5-4117-BB97-11DE70117345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"E866C4E5-D739-4352-9B6D-9753B4C78A24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FDA72E-991D-4451-9C8E-E738F4D12728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"DDE5A2D0-C268-4D2D-A001-AEC17E92B1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"79344F94-2CB8-4F08-9373-61614A38476C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"42D16634-442B-4674-B11E-6748D28764BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622C877B-760A-4C50-9FDF-998C010B864E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"7FA10863-C4C8-4658-8EEA-BC71B3522F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"E5D00EED-F95D-4458-BDC4-3390DE85348B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"1D91EC11-DD9A-434B-9EB4-14AA0E977D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"292EC144-CBA2-4275-9F70-4ED65A505B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"E6EC3436-7FAE-4311-8103-7ADBAF40E1C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"397AC4A5-B67C-483B-84F7-8CB294BB460C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"E697E4FD-1882-4BF8-9B9F-FB7DFD19497B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80509490-50DA-42F8-8A4A-A6F6B95649BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"18A39E28-E7BB-47A3-988B-4EBF070D3538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"1466F808-2596-4028-8884-27EDD5CACB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"394DF290-9328-4FAD-B04E-61F62B916148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7BBEC67-BD2E-49D5-8294-977D975D98D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1.\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"D931BC21-AF80-400C-A7E9-2C4AB19D748A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"6A11E433-943D-4D92-B45E-3FA268094278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"96AA67E0-3471-4699-87A7-E47DD8E313B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB76D898-4C7C-40E9-8539-E2A1BC7A5A66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"8C3C9586-D4ED-4486-9C1F-B357F34F8A84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"D4C3D6F5-D94D-46A3-991C-A11275B59F8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"6114B091-1612-4EA2-81D4-2E5455A345F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D68F26-EF89-4016-BD3A-637951752AAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"9F002114-483A-462C-B0BD-4E1591009935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"57CCB85A-6F90-4DB7-B0F8-AE5250E1DCFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"36F60067-2623-42F9-8B4F-C24F3268DDB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADAD6E9A-F8B5-4B2D-B687-AEAB518B8F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"6DE3443E-9D07-4A82-B110-02ADDA9FDEF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"60189636-02D6-44CA-BE2A-7777E3C409CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"68E2840B-96F4-4437-91D1-4AFE99E54D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E592A7-B530-4932-A81D-D1B9ABD64047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"5D08BA8F-4949-47EC-8EEF-312DC70043B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"47D07AA7-1E0E-4FC3-B8BF-05729619B0AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"A197CF35-47EE-4DAE-BC51-90663870B9B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E734E1C-A92F-4394-8F33-4429161BE47C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"4C9A0A9D-40AF-46DC-B577-DA73B4C2970B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"5AD75094-3248-4D37-969E-75272F6F31D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"15F4D416-10F4-4C08-A25D-0795F7FE0FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF10213-FBE4-47A5-8EF2-B45BF15BEB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.1\",\"versionEndIncluding\":\"11.6.3\",\"matchCriteriaId\":\"A36B6B7D-3900-43D4-B241-E58A1377B4DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.3\",\"matchCriteriaId\":\"E7860523-E8B3-4BEE-853A-6F0B5BCDDA5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"D6944128-3A30-4835-A125-3EA7571D7DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A85C15-B821-4992-9B06-45767E7467D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndIncluding\":\"5.1.0\",\"matchCriteriaId\":\"A87510FE-775A-44FB-9792-074CD5DE5C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B5497D9-9022-4788-87DB-6C4B4116509A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB85F4D0-A104-4954-8D73-B9980C8E93E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECB4DA3-3842-4102-8451-43EC00CBAEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D286AC5-DB3E-4FAE-8441-A4D98B1F1160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE427D5-6E9A-4AC3-830D-7D235DE97389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32591D5-D7F6-4C45-B1B5-1D1F8C649DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"032B2E4E-381E-4662-A6CF-8FA517233681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA708DD0-8A88-4B2B-9B57-A08491DE4696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0013CA3E-0E73-45EA-B2E9-7EA038BAB336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F993C993-D118-45A3-9F95-382B54E25439\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E53CEDB-F536-4DA0-917C-C220A3102B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27A026D0-AA0D-417A-A06B-8785E5FFCBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31DF55CF-FEDE-43DE-8F55-3264DB7CDD71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4C837B-4648-4764-B190-36381EE7E664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F044DA47-D8FA-4EF9-B28C-C69D0DE8C3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E600BCEC-2466-4348-ACE3-955469AA1C9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB8DD876-7E51-43A9-8944-B4DEE9E9EDD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431A3000-D903-4B57-9B54-CC650105B044\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E7428A-D2A5-4B77-8562-F75BB8C72976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E53549-337C-423F-AB34-F2559C1F225C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EABDA6F4-99E7-4354-9760-E9891B47DC8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_assurance_engine:2.1\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD40D143-B4B4-4C2A-8D9E-D928459FC59E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B5B87A-CECF-48BF-833E-6E4A6DF647CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A108A5-ADB1-4328-B3C0-9C3CC2CD1346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0F9723-F9BD-422D-8414-040C01C9C0D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B534882-60A5-4098-A439-A47CBC546E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB1C3395-1865-4436-81E0-3821B5BB99D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86ACAFA3-7F76-428A-A6EE-87284FB30B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8908328C-FC17-4BDC-B369-36942225DFAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988EDFD9-4652-4460-BE48-62219B8A0A6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD9DD18A-43B9-4B43-AF9F-236D42651E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"177FA398-F812-4E8D-99A3-3F7E0F690CE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A8F173C-2D38-42B2-B86F-72B53A96D05D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E03126-0FF6-4D4E-8766-A4F0B20741AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24CB2EC-A79E-4C56-8F03-86D53A9B28A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4F2333B-BE03-4D6C-AA16-1E3EB170496E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B199BF45-F9EF-49A0-B2D5-9B9FA6AA1208\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C65475E-2641-404B-8316-6B6A5029617D\"}]}]}],\"references\":[{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/3\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/4\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104976\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041424\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041434\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2384\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2395\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2402\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2403\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2645\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2776\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2785\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2789\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2790\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2791\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2924\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2933\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2948\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180815-0003/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K95343321\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cret@cert.org\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3732-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3732-2/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-2/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3742-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3742-2/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3763-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack\",\"source\":\"cret@cert.org\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4266\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/962459\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_41\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2395\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2924\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180815-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K95343321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3732-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3732-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3742-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3742-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3763-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4266\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/962459\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2018:2962-1
Vulnerability from csaf_suse
Published
2018-10-01 16:04
Modified
2018-10-01 16:04
Summary
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.114-94_11 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-2098,SUSE-SLE-Live-Patching-12-SP3-2018-2099,SUSE-SLE-Live-Patching-12-SP3-2018-2100,SUSE-SLE-Live-Patching-12-SP3-2018-2101,SUSE-SLE-Live-Patching-12-SP3-2018-2102,SUSE-SLE-Live-Patching-12-SP3-2018-2104
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_11 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-2098,SUSE-SLE-Live-Patching-12-SP3-2018-2099,SUSE-SLE-Live-Patching-12-SP3-2018-2100,SUSE-SLE-Live-Patching-12-SP3-2018-2101,SUSE-SLE-Live-Patching-12-SP3-2018-2102,SUSE-SLE-Live-Patching-12-SP3-2018-2104", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2962-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2962-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2962-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" }, { "category": "self", "summary": "SUSE Bug 1096723", "url": "https://bugzilla.suse.com/1096723" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000026 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000026/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-10-01T16:04:14Z", "generator": { "date": "2018-10-01T16:04:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2962-1", "initial_release_date": "2018-10-01T16:04:14Z", "revision_history": [ { "date": "2018-10-01T16:04:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "product_id": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000026" } ], "notes": [ { "category": "general", "text": "Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000026", "url": "https://www.suse.com/security/cve/CVE-2018-1000026" }, { "category": "external", "summary": "SUSE Bug 1079384 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1079384" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096723 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1096723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:04:14Z", "details": "important" } ], "title": "CVE-2018-1000026" }, { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:04:14Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:04:14Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:04:14Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2963-1
Vulnerability from csaf_suse
Published
2018-10-01 16:05
Modified
2018-10-01 16:05
Summary
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.140-94_42 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
- CVE-2018-3646: Fixed unauthorized disclosure of information residing in the L1 data cache on systems with microprocessors utilizing speculative execution and address translations (bsc#1099306).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-2108,SUSE-SLE-Live-Patching-12-SP3-2018-2109
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.140-94_42 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n- CVE-2018-3646: Fixed unauthorized disclosure of information residing in the L1 data cache on systems with microprocessors utilizing speculative execution and address translations (bsc#1099306).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-2108,SUSE-SLE-Live-Patching-12-SP3-2018-2109", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2963-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2963-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2963-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-10-01T16:05:21Z", "generator": { "date": "2018-10-01T16:05:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2963-1", "initial_release_date": "2018-10-01T16:05:21Z", "revision_history": [ { "date": "2018-10-01T16:05:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2374-1
Vulnerability from csaf_suse
Published
2018-08-16 09:37
Modified
2018-08-16 09:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.143 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on
the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391: A flaw in the IP packet reassembly could be used by remote attackers to consume CPU time (bnc#1103097).
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 1103580).
The following non-security bugs were fixed:
- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- alsa: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).
- alsa: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).
- alsa: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).
- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).
- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).
- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- atm: zatm: fix memcmp casting (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blkcg: simplify statistic accumulation code (bsc#1082979).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).
- block/swim: Fix array bounds check (bsc#1082979).
- bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).
- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).
- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).
- btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).
- btrfs: make raid6 rebuild retry more (bnc#1012382).
- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- CONFIG_HOTPLUG_SMT=y
- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- dm: convert DM printk macros to pr_<level> macros (bsc#1099918).
- dm: fix printk() rate limiting code (bsc#1099918).
- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).
- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).
- drbd: fix access after free (bnc#1012382).
- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- esp6: fix memleak on error path in esp6_input (git-fixes).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).
- fuse: fix control dir setup and teardown (bnc#1012382).
- genirq: Make force irq threading setup more robust (bsc#1082979).
- hid: debug: check length before copy_to_user() (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- ib/isert: fix T10-pi check mask setting (bsc#1082979).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- ib/qib: Fix DMA api warning with debug kernel (bnc#1012382).
- iio:buffer: make length types match kfifo types (bnc#1012382).
- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).
- input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).
- input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).
- input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).
- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).
- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).
- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).
- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).
- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).
- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).
- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).
- mips: ftrace: fix static function graph tracing (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).
- mtd: partitions: add helper for deleting partition (bsc#1099918).
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: handle string from userspace with care (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net/sonic: Use dma_mapping_error() (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).
- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- null_blk: use sector_div instead of do_div (bsc#1082979).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- of: unittest: for strings, account for trailing \0 in property length field (bnc#1012382).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).
- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).
- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).
- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).
- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).
- perf intel-pt: Fix 'Unexpected indirect branch' error (bnc#1012382).
- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- PM / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).
- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).
- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).
- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).
- RDMA/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).
- RDMA/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).
- RDMA/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717
- Revert 'Btrfs: fix scrub to repair raid6 corruption' (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).
- rpm/config.sh: Add support for non-default upstream URL Currently the scripts assume Linus' tree as the upstream URL where to pull things from. One may want to package test kernels from other upstream repos. Add support to add an URL to config.sh.
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- run_oldconfig.sh: Add --olddefconfig as an alias to --yes On later kernels there is the make target 'olddefconfig'. This is equvalent to what the '--yes' option does. Therefore, add the option '--olddefconfig' as an alias.
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).
- scsi: lpfc: Driver NVME load fails when CPU cnt > WQ resource cnt (bsc#1092207).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).
- scsi: lpfc: Fix MDS diagnostics failure (Rx < Tx) (bsc#1095453).
- scsi: lpfc: Fix port initialization failure (bsc#1095453).
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).
- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).
- scsi: sg: fix minor memory leak in error path (bsc#1082979).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).
- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- ubi: fastmap: Cancel work upon detach (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- ubifs: Fix potential integer overflow in allocation (bnc#1012382).
- udf: Detect incorrect directory size (bnc#1012382).
- Update config files. CONFIG_X86_FAST_FEATURE_TESTS=y
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).
- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: cp210x: add CESINEL device ids (bnc#1012382).
- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).
- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).
- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).
- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).
- xfrm: skip policies marked as dead while rehashing (bnc#1012382).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-SDK-12-SP3-2018-1606,SUSE-SLE-SERVER-12-SP3-2018-1606
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.143 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on \nthe same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5391: A flaw in the IP packet reassembly could be used by remote attackers to consume CPU time (bnc#1103097).\n- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 1103580).\n\nThe following non-security bugs were fixed:\n\n- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- alsa: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).\n- alsa: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).\n- alsa: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).\n- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).\n- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).\n- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).\n- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- atm: zatm: fix memcmp casting (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).\n- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).\n- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blkcg: simplify statistic accumulation code (bsc#1082979).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).\n- block/swim: Fix array bounds check (bsc#1082979).\n- bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).\n- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).\n- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).\n- btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).\n- btrfs: make raid6 rebuild retry more (bnc#1012382).\n- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cifs: Fix infinite loop when using hard mount option (bnc#1012382).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override \u0027inline\u0027 for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- CONFIG_HOTPLUG_SMT=y\n- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- dm: convert DM printk macros to pr_\u003clevel\u003e macros (bsc#1099918).\n- dm: fix printk() rate limiting code (bsc#1099918).\n- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).\n- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).\n- drbd: fix access after free (bnc#1012382).\n- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm: re-enable error handling (bsc#1103884).\n- esp6: fix memleak on error path in esp6_input (git-fixes).\n- ext4: add more inode number paranoia checks (bnc#1012382).\n- ext4: add more mount time checks of the superblock (bnc#1012382).\n- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).\n- ext4: check superblock mapped prior to committing (bnc#1012382).\n- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).\n- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).\n- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).\n- ext4: only look at the bg_flags field if it is valid (bnc#1012382).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).\n- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).\n- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).\n- fuse: fix control dir setup and teardown (bnc#1012382).\n- genirq: Make force irq threading setup more robust (bsc#1082979).\n- hid: debug: check length before copy_to_user() (bnc#1012382).\n- hid: hiddev: fix potential Spectre v1 (bnc#1012382).\n- hid: i2c-hid: Fix \u0027incomplete report\u0027 noise (bnc#1012382).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).\n- ib/isert: fix T10-pi check mask setting (bsc#1082979).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- ib/qib: Fix DMA api warning with debug kernel (bnc#1012382).\n- iio:buffer: make length types match kfifo types (bnc#1012382).\n- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).\n- input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).\n- input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).\n- input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).\n- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).\n- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).\n- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).\n- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).\n- kabi protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 since no one uses symboles expoted by bcache.\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- keys: DNS: fix parsing multiple options (bnc#1012382).\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1102214).\n- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).\n- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).\n- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).\n- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).\n- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).\n- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).\n- media: cx25840: Use subdev host data for PLL override (bnc#1012382).\n- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).\n- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).\n- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).\n- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).\n- mips: ftrace: fix static function graph tracing (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- mm: hugetlb: yield when prepping struct pages (bnc#1012382).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).\n- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).\n- mtd: partitions: add helper for deleting partition (bsc#1099918).\n- mtd: partitions: remove sysfs files when deleting all master\u0027s partitions (bsc#1099918).\n- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- netfilter: ebtables: handle string from userspace with care (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net/sonic: Use dma_mapping_error() (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).\n- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).\n- n_tty: Access echo_* variables carefully (bnc#1012382).\n- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).\n- null_blk: use sector_div instead of do_div (bsc#1082979).\n- nvme-pci: initialize queue memory before interrupts (bnc#1012382).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item-\u003eci_parent (bnc#1012382).\n- of: unittest: for strings, account for trailing \\0 in property length field (bnc#1012382).\n- ovl: fix random return value on mount (bsc#1099993).\n- ovl: fix uid/gid when creating over whiteout (bsc#1099993).\n- ovl: override creds with the ones from the superblock mounter (bsc#1099993).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).\n- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).\n- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).\n- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).\n- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).\n- perf intel-pt: Fix \u0027Unexpected indirect branch\u0027 error (bnc#1012382).\n- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- PM / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).\n- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).\n- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).\n- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).\n- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).\n- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).\n- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).\n- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).\n- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).\n- RDMA/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).\n- RDMA/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).\n- RDMA/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- Revert \u0027block-cancel-workqueue-entries-on-blk_mq_freeze_queue\u0027 (bsc#1103717\n- Revert \u0027Btrfs: fix scrub to repair raid6 corruption\u0027 (bnc#1012382).\n- Revert \u0027sit: reload iphdr in ipip6_rcv\u0027 (bnc#1012382).\n- Revert \u0027x86/cpufeature: Move some of the scattered feature bits to x86_capability\u0027 (kabi).\n- Revert \u0027x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6\u0027 (kabi).\n- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).\n- rpm/config.sh: Add support for non-default upstream URL Currently the scripts assume Linus\u0027 tree as the upstream URL where to pull things from. One may want to package test kernels from other upstream repos. Add support to add an URL to config.sh.\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- run_oldconfig.sh: Add --olddefconfig as an alias to --yes On later kernels there is the make target \u0027olddefconfig\u0027. This is equvalent to what the \u0027--yes\u0027 option does. Therefore, add the option \u0027--olddefconfig\u0027 as an alias.\n- s390: Correct register corruption in critical section cleanup (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).\n- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).\n- scsi: lpfc: Driver NVME load fails when CPU cnt \u003e WQ resource cnt (bsc#1092207).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).\n- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).\n- scsi: lpfc: Fix MDS diagnostics failure (Rx \u003c Tx) (bsc#1095453).\n- scsi: lpfc: Fix port initialization failure (bsc#1095453).\n- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).\n- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).\n- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).\n- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).\n- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).\n- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)\n- scsi: qlogicpti: Fix an error handling path in \u0027qpti_sbus_probe()\u0027 (bsc#1082979).\n- scsi: sg: fix minor memory leak in error path (bsc#1082979).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).\n- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).\n- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).\n- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).\n- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).\n- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).\n- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).\n- tracing: Fix missing return symbol in function_graph output (bnc#1012382).\n- ubi: fastmap: Cancel work upon detach (bnc#1012382).\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).\n- ubifs: Fix potential integer overflow in allocation (bnc#1012382).\n- udf: Detect incorrect directory size (bnc#1012382).\n- Update config files. CONFIG_X86_FAST_FEATURE_TESTS=y\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).\n- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- usb: serial: cp210x: add CESINEL device ids (bnc#1012382).\n- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).\n- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- usb: serial: mos7840: fix status-register error handling (bnc#1012382).\n- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).\n- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to \u003casm/asm.h\u003e (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/mce: Fix incorrect \u0027Machine check from unknown source\u0027 message (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).\n- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).\n- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).\n- xfrm: skip policies marked as dead while rehashing (bnc#1012382).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SDK-12-SP3-2018-1606,SUSE-SLE-SERVER-12-SP3-2018-1606", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2374-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2374-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182374-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2374-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1023711", "url": "https://bugzilla.suse.com/1023711" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1078216", "url": "https://bugzilla.suse.com/1078216" }, { "category": "self", "summary": "SUSE Bug 1082653", "url": "https://bugzilla.suse.com/1082653" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1085657", "url": "https://bugzilla.suse.com/1085657" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1087659", "url": "https://bugzilla.suse.com/1087659" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1089525", "url": "https://bugzilla.suse.com/1089525" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1090340", "url": "https://bugzilla.suse.com/1090340" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1092001", "url": "https://bugzilla.suse.com/1092001" }, { "category": "self", "summary": "SUSE Bug 1092207", "url": "https://bugzilla.suse.com/1092207" }, { "category": "self", "summary": "SUSE Bug 1093777", "url": "https://bugzilla.suse.com/1093777" }, { "category": "self", "summary": "SUSE Bug 1094120", "url": "https://bugzilla.suse.com/1094120" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1095453", "url": "https://bugzilla.suse.com/1095453" }, { "category": "self", "summary": "SUSE Bug 1095643", "url": "https://bugzilla.suse.com/1095643" }, { "category": "self", "summary": "SUSE Bug 1096790", "url": "https://bugzilla.suse.com/1096790" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097034", "url": "https://bugzilla.suse.com/1097034" }, { "category": "self", "summary": "SUSE Bug 1097501", "url": "https://bugzilla.suse.com/1097501" }, { "category": "self", "summary": "SUSE Bug 1097771", "url": "https://bugzilla.suse.com/1097771" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1099713", "url": "https://bugzilla.suse.com/1099713" }, { "category": "self", "summary": "SUSE Bug 1099792", "url": "https://bugzilla.suse.com/1099792" }, { "category": "self", "summary": "SUSE Bug 1099810", "url": "https://bugzilla.suse.com/1099810" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099918", "url": "https://bugzilla.suse.com/1099918" }, { "category": "self", "summary": "SUSE Bug 1099966", "url": "https://bugzilla.suse.com/1099966" }, { "category": "self", "summary": "SUSE Bug 1099993", "url": "https://bugzilla.suse.com/1099993" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100340", "url": "https://bugzilla.suse.com/1100340" }, { "category": "self", "summary": "SUSE Bug 1100843", "url": "https://bugzilla.suse.com/1100843" }, { "category": "self", "summary": "SUSE Bug 1100930", "url": "https://bugzilla.suse.com/1100930" }, { "category": "self", "summary": "SUSE Bug 1101296", "url": "https://bugzilla.suse.com/1101296" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101658", "url": "https://bugzilla.suse.com/1101658" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1102188", "url": "https://bugzilla.suse.com/1102188" }, { "category": "self", "summary": "SUSE Bug 1102197", "url": "https://bugzilla.suse.com/1102197" }, { "category": "self", "summary": "SUSE Bug 1102203", "url": "https://bugzilla.suse.com/1102203" }, { "category": "self", "summary": "SUSE Bug 1102205", "url": "https://bugzilla.suse.com/1102205" }, { "category": "self", "summary": "SUSE Bug 1102207", "url": "https://bugzilla.suse.com/1102207" }, { "category": "self", "summary": "SUSE Bug 1102211", "url": "https://bugzilla.suse.com/1102211" }, { "category": "self", "summary": "SUSE Bug 1102214", "url": "https://bugzilla.suse.com/1102214" }, { "category": "self", "summary": "SUSE Bug 1102215", "url": "https://bugzilla.suse.com/1102215" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102394", "url": "https://bugzilla.suse.com/1102394" }, { "category": "self", "summary": "SUSE Bug 1102683", "url": "https://bugzilla.suse.com/1102683" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE Bug 1103717", "url": "https://bugzilla.suse.com/1103717" }, { "category": "self", "summary": "SUSE Bug 1103745", "url": "https://bugzilla.suse.com/1103745" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 997935", "url": "https://bugzilla.suse.com/997935" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T09:37:31Z", "generator": { "date": "2018-08-16T09:37:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2374-1", "initial_release_date": "2018-08-16T09:37:31Z", "revision_history": [ { "date": "2018-08-16T09:37:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-docs-azure-4.4.143-4.13.1.noarch", "product": { "name": "kernel-docs-azure-4.4.143-4.13.1.noarch", "product_id": "kernel-docs-azure-4.4.143-4.13.1.noarch" } }, { "category": "product_version", "name": "kernel-devel-azure-4.4.143-4.13.1.noarch", "product": { "name": "kernel-devel-azure-4.4.143-4.13.1.noarch", "product_id": "kernel-devel-azure-4.4.143-4.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.4.143-4.13.1.noarch", "product": { "name": "kernel-source-azure-4.4.143-4.13.1.noarch", "product_id": "kernel-source-azure-4.4.143-4.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-azure-4.4.143-4.13.1.x86_64", "product": { "name": "kernel-azure-4.4.143-4.13.1.x86_64", "product_id": "kernel-azure-4.4.143-4.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.4.143-4.13.1.x86_64", "product": { "name": "kernel-azure-base-4.4.143-4.13.1.x86_64", "product_id": "kernel-azure-base-4.4.143-4.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "product": { "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "product_id": "kernel-azure-devel-4.4.143-4.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-docs-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-source-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-source-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2018-5391" } ] }
suse-su-2018:2223-1
Vulnerability from csaf_suse
Published
2018-08-06 17:25
Modified
2018-08-06 17:25
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
CVE-2018-5390 aka SegmentSmack:
A remote attacker even with relatively low bandwidth could have caused lots of CPU usage
by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)
CVE-2017-18344:
The timer_create syscall implementation didn't properly validate input, which could have lead to out-of-bounds access.
This allowed userspace applications to read arbitrary kernel memory in some setups. (bsc#1102851)
The following non-security bugs were fixed:
- acpi, apei, einj: Subtract any matching Register Region from Trigger resources (bsc#1051510).
- acpi, nfit: Fix scrub idle detection (bsc#1094119).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1051510).
- acpi/processor: Finish making acpi_processor_ppc_has_changed() void (bsc#1051510).
- ahci: Disable Lpm on Lenovo 50 series laptops with a too old BIOS (bsc#1051510).
- alsa: hda - Handle pm failure during hotplug (bsc#1051510).
- alsa: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk (bsc#1051510).
- alsa: hda/realtek - Yet another Clevo P950 quirk entry (bsc#1101143).
- alsa: hda/realtek - two more lenovo models need fixup of MIC_LOCATION (bsc#1051510).
- alsa: hda: add mute led support for HP ProBook 455 G5 (bsc#1051510).
- alsa: rawmidi: Change resized buffers atomically (bsc#1051510).
- alx: take rtnl before calling __alx_open from resume (bsc#1051510).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1103220).
- arm: module: fix modsign build error (bsc#1093666).
- asoc: mediatek: preallocate pages use platform device (bsc#1051510).
- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1051510).
- atl1c: reserve min skb headroom (bsc#1051510).
- audit: Fix wrong task in comparison of session ID (bsc#1051510).
- audit: ensure that 'audit=1' actually enables audit for PID 1 (bsc#1051510).
- audit: return on memory error to avoid null pointer dereference (bsc#1051510).
- b44: Initialize 64-bit stats seqcount (bsc#1051510).
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1051510).
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1051510).
- batman-adv: Accept only filled wifi station info (bsc#1051510).
- batman-adv: Always initialize fragment header priority (bsc#1051510).
- batman-adv: Avoid race in TT TVLV allocator helper (bsc#1051510).
- batman-adv: Avoid storing non-TT-sync flags on singular entries too (bsc#1051510).
- batman-adv: Fix TT sync flags for intermediate TT responses (bsc#1051510).
- batman-adv: Fix bat_ogm_iv best gw refcnt after netlink dump (bsc#1051510).
- batman-adv: Fix bat_v best gw refcnt after netlink dump (bsc#1051510).
- batman-adv: Fix check of retrieved orig_gw in batadv_v_gw_is_eligible (bsc#1051510).
- batman-adv: Fix debugfs path for renamed hardif (bsc#1051510).
- batman-adv: Fix debugfs path for renamed softif (bsc#1051510).
- batman-adv: Fix internal interface indices types (bsc#1051510).
- batman-adv: Fix lock for ogm cnt access in batadv_iv_ogm_calc_tq (bsc#1051510).
- batman-adv: Fix multicast packet loss with a single WANT_ALL_IPV4/6 flag (bsc#1051510).
- batman-adv: Fix netlink dumping of BLA backbones (bsc#1051510).
- batman-adv: Fix netlink dumping of BLA claims (bsc#1051510).
- batman-adv: Fix skbuff rcsum on packet reroute (bsc#1051510).
- batman-adv: Ignore invalid batadv_iv_gw during netlink send (bsc#1051510).
- batman-adv: Ignore invalid batadv_v_gw during netlink send (bsc#1051510).
- batman-adv: Use default throughput value on cfg80211 error (bsc#1051510).
- batman-adv: fix TT sync flag inconsistencies (bsc#1051510).
- batman-adv: fix header size check in batadv_dbg_arp() (bsc#1051510).
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bsc#1051510).
- batman-adv: fix packet checksum in receive path (bsc#1051510).
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bsc#1051510).
- batman-adv: invalidate checksum on fragment reassembly (bsc#1051510).
- batman-adv: update data pointers after skb_cow() (bsc#1051510).
- blk-mq: count allocated but not started requests in iostats inflight (bsc#1077989).
- blk-mq: fix sysfs inflight counter (bsc#1077989).
- block: always set partition number to '0' in blk_partition_remap() (bsc#1054245).
- block: always set partition number to '0' in blk_partition_remap() (bsc#1077989).
- block: bio_check_eod() needs to consider partitions (bsc#1077989).
- block: fail op_is_write() requests to read-only partitions (bsc#1077989).
- block: pass 'run_queue' to blk_mq_request_bypass_insert (bsc#1077989).
- block: set request_list for request (bsc#1077989).
- bluetooth: avoid recursive locking in hci_send_to_channel() (bsc#1051510).
- bluetooth: hci_ll: Add support for the external clock (bsc#1051510).
- bluetooth: hci_ll: Fix download_firmware() return when __hci_cmd_sync fails (bsc#1051510).
- bluetooth: hci_nokia: select BT_HCIUART_H4 (bsc#1051510).
- bluetooth: hci_uart: fix kconfig dependency (bsc#1051510).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242).
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242).
- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242).
- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242).
- bnxt_en: Fix for system hang if request_irq fails (bsc#1050242).
- bnxt_en: Fix for system hang if request_irq fails (bsc#1050242).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242).
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242).
- bnxt_en: Fix the vlan_tci exact match check (bsc#1050242).
- bnxt_en: Fix the vlan_tci exact match check (bsc#1050242).
- bonding: re-evaluate force_primary when the primary slave name changes (networking-stable-18_06_20).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- bus: arm-cci: Fix use of smp_processor_id() in preemptible context (bsc#1051510).
- bus: arm-ccn: Check memory allocation failure (bsc#1051510).
- bus: arm-ccn: Fix use of smp_processor_id() in preemptible context (bsc#1051510).
- bus: arm-ccn: fix module unloading Error: Removing state 147 which has instances left (bsc#1051510).
- can: bcm: check for null sk before deferencing it via the call to sock_net (bsc#1051510).
- can: m_can.c: fix setup of CCCR register: clear CCCR NISO bit before checking can.ctrlmode (bsc#1051510).
- can: mpc5xxx_can: check of_iomap return before use (bsc#1051510).
- can: peak_canfd: fix firmware v3.3.0: limit allocation to 32-bit DMA addr only (bsc#1051510).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bsc#1051510).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bsc#1051510).
- can: xilinx_can: fix device dropping off bus on RX overrun (bsc#1051510).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bsc#1051510).
- can: xilinx_can: fix power management handling (bsc#1051510).
- can: xilinx_can: fix recovery from error states not being propagated (bsc#1051510).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bsc#1051510).
- cdc_ncm: avoid padding beyond end of skb (networking-stable-18_06_20).
- cfg80211: initialize sinfo in cfg80211_get_station (bsc#1051510).
- checkpatch: add 6 missing types to --list-types (bsc#1051510).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097).
- clk: Do not show the incorrect clock phase (bsc#1051510).
- clk: Do not write error code into divider register (bsc#1051510).
- clk: Fix __set_clk_rates error print-string (bsc#1051510).
- clk: at91: PLL recalc_rate() now using cached MUL and DIV values (bsc#1051510).
- clk: at91: fix clk-generated parenting (bsc#1051510).
- clk: axi-clkgen: Correctly handle nocount bit in recalc_rate() (bsc#1051510).
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bsc#1051510).
- clk: fix false-positive Wmaybe-uninitialized warning (bsc#1051510).
- clk: fix mux clock documentation (bsc#1051510).
- clk: fix set_rate_range when current rate is out of range (bsc#1051510).
- clk: hi3660: fix incorrect uart3 clock freqency (bsc#1051510).
- clk: hi6220: change watchdog clock source (bsc#1051510).
- clk: hi6220: mark clock cs_atb_syspll as critical (bsc#1051510).
- clk: hisilicon: fix potential NULL dereference in hisi_clk_alloc() (bsc#1051510).
- clk: hisilicon: mark wdt_mux_p[] as const (bsc#1051510).
- clk: honor CLK_MUX_ROUND_CLOSEST in generic clk mux (bsc#1051510).
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bsc#1051510).
- clk: imx7d: fix mipi dphy div parent (bsc#1051510).
- clk: mediatek: add the option for determining PLL source clock (bsc#1051510).
- clk: mediatek: mark mtk_infrasys_init_early __init (bsc#1051510).
- clk: meson: gxbb: fix clk_mclk_i958 divider flags (bsc#1051510).
- clk: meson: gxbb: fix meson cts_amclk divider flags (bsc#1051510).
- clk: meson: gxbb: fix wrong clock for SARADC/SANA (bsc#1051510).
- clk: meson: meson8b: fix protection against undefined clks (bsc#1051510).
- clk: meson: mpll: fix mpll0 fractional part ignored (bsc#1051510).
- clk: meson: mpll: use 64-bit maths in params_from_rate (bsc#1051510).
- clk: meson: remove unnecessary rounding in the pll clock (bsc#1051510).
- clk: mvebu: use correct bit for 98DX3236 NAND (bsc#1051510).
- clk: qcom: Base rcg parent rate off plan frequency (bsc#1051510).
- clk: qcom: clk-smd-rpm: Fix the reported rate of branches (bsc#1051510).
- clk: qcom: common: fix legacy board-clock registration (bsc#1051510).
- clk: qcom: msm8916: Fix bimc gpu clock ops (bsc#1051510).
- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bsc#1051510).
- clk: renesas: div6: Document fields used for parent selection (bsc#1051510).
- clk: renesas: r8a7745: Remove PLL configs for MD19=0 (bsc#1051510).
- clk: renesas: r8a7745: Remove nonexisting scu-src[0789] clocks (bsc#1051510).
- clk: renesas: r8a7795: Correct pwm, gpio, and i2c parent clocks on ES2.0 (bsc#1051510).
- clk: renesas: rcar-gen2: Fix PLL0 on R-Car V2H and E2 (bsc#1051510).
- clk: rockchip: Fix wrong parent for SDMMC phase clock for rk3228 (bsc#1051510).
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bsc#1051510).
- clk: samsung: Fix m2m scaler clock on Exynos542x (bsc#1051510).
- clk: samsung: exynos3250: Fix PLL rates (bsc#1051510).
- clk: samsung: exynos5250: Add missing clocks for FIMC LITE SYSMMU devices (bsc#1051510).
- clk: samsung: exynos5250: Fix PLL rates (bsc#1051510).
- clk: samsung: exynos5260: Fix PLL rates (bsc#1051510).
- clk: samsung: exynos5433: Fix PLL rates (bsc#1051510).
- clk: samsung: exynos7: Fix PLL rates (bsc#1051510).
- clk: samsung: s3c2410: Fix PLL rates (bsc#1051510).
- clk: scpi: error when clock fails to register (bsc#1051510).
- clk: scpi: fix return type of __scpi_dvfs_round_rate (bsc#1051510).
- clk: si5351: Rename internal plls to avoid name collisions (bsc#1051510).
- clk: si5351: fix PLL reset (bsc#1051510).
- clk: socfpga: Fix the smplsel on Arria10 and Stratix10 (bsc#1051510).
- clk: sunxi-ng: Fix fractional mode for N-M clocks (bsc#1051510).
- clk: sunxi-ng: Make fractional helper less chatty (bsc#1051510).
- clk: sunxi-ng: Wait for lock when using fractional mode (bsc#1051510).
- clk: sunxi-ng: a31: Fix CLK_OUT_* clock ops (bsc#1051510).
- clk: sunxi-ng: add CLK_SET_RATE_PARENT flag to H3 GPU clock (bsc#1051510).
- clk: sunxi-ng: add CLK_SET_RATE_UNGATE to all H3 PLLs (bsc#1051510).
- clk: sunxi-ng: allow set parent clock (PLL_CPUX) for CPUX clock on H3 (bsc#1051510).
- clk: sunxi-ng: h3: gate then ungate PLL CPU clk after rate change (bsc#1051510).
- clk: sunxi-ng: multiplier: Fix fractional mode (bsc#1051510).
- clk: sunxi-ng: nm: Check if requested rate is supported by fractional clock (bsc#1051510).
- clk: sunxi-ng: sun5i: Fix bit offset of audio PLL post-divider (bsc#1051510).
- clk: sunxi-ng: sun6i: Export video PLLs (bsc#1051510).
- clk: sunxi-ng: sun6i: Rename HDMI DDC clock to avoid name collision (bsc#1051510).
- clk: sunxi: fix build warning (bsc#1051510).
- clk: sunxi: fix uninitialized access (bsc#1051510).
- clk: tegra: Fix cclk_lp divisor register (bsc#1051510).
- clk: tegra: Fix pll_u rate configuration (bsc#1051510).
- clk: tegra: Use readl_relaxed_poll_timeout_atomic() in tegra210_clock_init() (bsc#1051510).
- clk: ti: dra7-atl-clock: fix child-node lookups (bsc#1051510).
- clk: uniphier: fix DAPLL2 clock rate of Pro5 (bsc#1051510).
- clk: x86: Do not gate clocks enabled by the firmware (bsc#1051510).
- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bsc#1051510).
- clocksource/drivers/stm32: Fix kernel panic with multiple timers (bsc#1051510).
- cnic: Fix an error handling path in 'cnic_alloc_bnx2x_resc()' (bsc#1086324).
- cnic: Fix an error handling path in 'cnic_alloc_bnx2x_resc()' (bsc#1086324).
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bsc#1100884).
- cpufreq: Fix new policy initialization during limits updates via sysfs (bsc#1100884).
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bsc#1100884).
- cpufreq: docs: Add missing cpuinfo_cur_freq description (bsc#1051510).
- cpufreq: docs: Drop intel-pstate.txt from index.txt (bsc#1051510).
- cpufreq: governors: Fix long idle detection logic in load calculation (bsc#1100884).
- cpufreq: powernv: Fix hardlockup due to synchronous smp_call in timer interrupt (bsc#1100884).
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bsc#1100884).
- crash_dump: is_kdump_kernel can be boolean (bsc#1103230).
- crypto: caam/qi - explicitly set dma_ops (bsc#1051510).
- crypto: ccp - remove unused variable qim (bsc#1051510).
- crypto: change transient busy return code to -ENOSPC (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Add authenc versions of ctr and sha (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Check error code with IS_ERR macro (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Fix IV updated in XTS operation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Fix Indentation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Fix an error code in chcr_hash_dma_map() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Fix indentation warning (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Fix iv passed in fallback path for rfc3686 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Fix src buffer dma length (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Make function aead_ccm_validate_input static (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Remove allocation of sg list to implement 2K limit of dsgl header (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Remove dst sg size zero check (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Remove unused parameter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Update IV before sending request to HW (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Use kernel round function to align lengths (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - Use x8_ble gf multiplication to calculate IV (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - check for sg null (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: chelsio - do not leak pointers to authenc keys (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bsc#1051510).
- crypto: crypto4xx - remove bad list_del (bsc#1051510).
- crypto: gf128mul - The x8_ble multiplication functions (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- crypto: sha512-mb - add some missing unlock on error (bsc#1051510).
- cxgb4/cxgb4vf: Notify link changes to OS-dependent code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4/cxgb4vf: add support for ndo_set_vf_vlan (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4/cxgb4vf: check fw caps to set link mode mask (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4/cxgb4vf: link management changes for new SFP (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add FORCE_PAUSE bit to 32 bit port caps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add HMA support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add TP Congestion map entry for single-port (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add new T5 device id (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add new T6 device ids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add support for ethtool i2c dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add support to initialise/read SRQ entries (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Add support to query HW SRQ parameters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Adds CPL support for Shared Receive Queues (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Check alignment constraint for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Check for kvzalloc allocation failure (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Fix error handling path in 'init_one()' (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Fix queue free path of ULD drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Fix {vxlan/geneve}_port initialization (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: IPv6 filter takes 2 tids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Setup FW queues before registering netdev (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Support firmware rdma write completion work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: Support firmware rdma write with immediate work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: add new T5 device id's (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: avoid schedule while atomic (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: change the port capability bits definition (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: clean up init_one (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: collect SGE PF/VF queue map (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: copy adap index to PF0-3 adapter instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: copy mbox log size to PF0-3 adap instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: copy the length of cpl_tx_pkt_core to fw_wr (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: copy vlan_id in ndo_get_vf_config (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: depend on firmware event for link status (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do L1 config when module is inserted (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do not display 50Gbps as unsupported speed (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do not fail vf instatiation in slave mode (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: do not set needs_free_netdev for mgmt dev's (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: enable ZLib_DEFLATE when building cxgb4 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: enable inner header checksum calculation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: fix the wrong conversion of Mbps to Kbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: free up resources of pf 0-3 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: increase max tx rate limit to 100 Gbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: notify fatal error to uld drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: remove dead code when allocating filter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: restructure VF mgmt code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: rework on-chip memory read (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: support new ISSI flash parts (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: update LE-TCAM collection for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: update dump collection logic to use compression (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: use CLIP with LIP6 on T6 for TCAM filters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: use zlib deflate to compress firmware dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4: zero the HMA memory (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4vf: Forcefully link up virtual interfaces (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgb4vf: display pause settings (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- cxgbit: call neigh_event_send() to update MAC address (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (networking-stable-18_06_08).
- device property: Allow iterating over available child fwnodes (bsc#1098633).
- device property: Introduce fwnode_call_bool_op() for ops that return bool (bsc#1098633).
- device property: Introduce fwnode_device_is_available() (bsc#1098633).
- device property: Introduce fwnode_get_mac_address() (bsc#1098633).
- device property: Introduce fwnode_get_phy_mode() (bsc#1098633).
- device property: Introduce fwnode_irq_get() (bsc#1098633).
- device property: Move FW type specific functionality to FW specific files (bsc#1098633).
- device property: Move fwnode graph ops to firmware specific locations (bsc#1098633).
- device property: preserve usecount for node passed to of_fwnode_graph_get_port_parent() (bsc#1098633).
- dmaengine: fsl-edma: disable clks on all error paths (bsc#1051510).
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bsc#1051510).
- dmaengine: mv_xor_v2: Fix clock resource by adding a register clock (bsc#1051510).
- dmaengine: omap-dma: port_window support correction for both direction (bsc#1051510).
- dmaengine: pl330: fix a race condition in case of threaded irqs (bsc#1051510).
- dmaengine: pl330: report BURST residue granularity (bsc#1051510).
- dmaengine: qcom: bam_dma: get num-channels and num-ees from dt (bsc#1051510).
- dmaengine: qcom_hidma: check pending interrupts (bsc#1051510).
- dmaengine: rcar-dmac: Check the done lists in rcar_dmac_chan_get_residue() (bsc#1051510).
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bsc#1051510).
- dmaengine: tegra-apb: Really fix runtime-pm usage (bsc#1051510).
- dmaengine: tegra210-adma: fix of_irq_get() error check (bsc#1051510).
- dmaengine: xilinx_dma: Fix error code format specifier (bsc#1051510).
- dmaengine: zynqmp_dma: Fix race condition in the probe (bsc#1051510).
- doc: Rename .system_keyring to .builtin_trusted_keys (bsc#1051510).
- doc: SKB_GSO_[IPIP|SIT] have been replaced (bsc#1051510).
- docs-rst: fix broken links to dynamic-debug-howto in kernel-parameters (bsc#1051510).
- docs: segmentation-offloads.txt: Fix ref to SKB_GSO_TUNNEL_REMCSUM (bsc#1051510).
- docu: admin-guide: intel_pstate: Fix sysfs path (bsc#1051510).
- dp83640: Ensure against premature access to PHY registers after reset (bsc#1051510).
- drbd: fix access after free (bsc#1051510).
- driver core: Fix link to device power management documentation (bsc#1051510).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bsc#1051510).
- drivers/firmware: psci_checker: Add missing destroy_timer_on_stack() (bsc#1051510).
- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301).
- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301).
- drivers: net: i40evf: use setup_timer() helper (bsc#1101816).
- drivers: net: i40evf: use setup_timer() helper (bsc#1101816).
- drm/bridge/sii8620: fix potential buffer overflow (bsc#1051510).
- drm/exynos: Fix dma-buf import (bsc#1051510).
- drm/i915/dp: Send DPCD ON for MST before phy_up (bsc#1051510).
- drm/i915: Fix hotplug irq ack on i965/g4x (bsc#1051510).
- drm/i915: Only call tasklet_kill() on the first prepare_reset (bsc#1051510).
- drm/nouveau/drm/nouveau: Fix runtime pm leak in nv50_disp_atomic_commit() (bsc#1090888).
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1051510).
- drm/nouveau: Avoid looping through fake MST connectors (bsc#1051510).
- drm/nouveau: Use drm_connector_list_iter_* for iterating connectors (bsc#1051510).
- drm/rockchip: Fix build warning in analogix_dp-rockchip.c (bsc#1085536).
- drm/rockchip: analogix_dp: Remove unnecessary init code (bsc#1085536).
- drm/rockchip: dw_hdmi: Move HDMI vpll clock enable to bind() (bsc#1087092).
- drm/rockchip: inno_hdmi: Fix error handling path (bsc#1087092).
- drm/rockchip: inno_hdmi: reorder clk_disable_unprepare call in unbind (bsc#1087092).
- drm/tegra: Acquire a reference to the IOVA cache (bsc#1090888).
- drm/udl: fix display corruption of the last line (bsc#1101337).
- drm: Use kvzalloc for allocating blob property memory (bsc#1101352).
- drm: mali-dp: Uninitialized variable in malidp_se_check_scaling() (bsc#1087092).
- drm: rcar-du: Remove zpos field from rcar_du_vsp_plane_state structure (bsc#1085539).
- drm: rcar-du: lvds: Fix LVDCR1 for R-Car gen3 (bsc#1085539).
- dvb_frontend: do not use-after-free the frontend struct (bsc#1051510).
- efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps() (bsc#1051510).
- enic: do not overwrite error code (bsc#1037697).
- enic: enable rq before updating rq descriptors (bsc#1037697).
- enic: set DMA mask to 47 bit (networking-stable-18_06_08).
- ethtool: add ethtool_intersect_link_masks (bsc#1101816).
- ethtool: add ethtool_intersect_link_masks (bsc#1101816).
- firewire: net: max MTU off by one (bsc#1051510).
- firmware: arm_scpi: fix endianness of dev_id in struct dev_pstate_set (bsc#1051510).
- firmware: dmi: Optimize dmi_matches (bsc#1051510).
- firmware: tegra: Fix locking bugs in BpmP (bsc#1051510).
- fix kabi due to perf_event.h uapi field change ().
- fm10k: Fix configuration for macvlan offload (bsc#1101813).
- fm10k: Fix configuration for macvlan offload (bsc#1101813).
- fm10k: Fix misuse of net_ratelimit() (bsc#1101813).
- fm10k: Fix misuse of net_ratelimit() (bsc#1101813).
- fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813).
- fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813).
- fm10k: add missing fall through comment (bsc#1101813).
- fm10k: add missing fall through comment (bsc#1101813).
- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813).
- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813).
- fm10k: avoid needless delay when loading driver (bsc#1101813).
- fm10k: avoid needless delay when loading driver (bsc#1101813).
- fm10k: avoid possible truncation of q_vector->name (bsc#1101813).
- fm10k: avoid possible truncation of q_vector->name (bsc#1101813).
- fm10k: bump version number (bsc#1101813).
- fm10k: bump version number (bsc#1101813).
- fm10k: bump version number (bsc#1101813).
- fm10k: bump version number (bsc#1101813).
- fm10k: clarify action when updating the VLAN table (bsc#1101813).
- fm10k: clarify action when updating the VLAN table (bsc#1101813).
- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813).
- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813).
- fm10k: correct typo in fm10k_pf.c (bsc#1101813).
- fm10k: correct typo in fm10k_pf.c (bsc#1101813).
- fm10k: do not assume VLAN 1 is enabled (bsc#1101813).
- fm10k: do not assume VLAN 1 is enabled (bsc#1101813).
- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813).
- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813).
- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813).
- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813).
- fm10k: fix 'failed to kill vid' message for VF (bsc#1101813).
- fm10k: fix 'failed to kill vid' message for VF (bsc#1101813).
- fm10k: fix function doxygen comments (bsc#1101813).
- fm10k: fix function doxygen comments (bsc#1101813).
- fm10k: fix incorrect warning for function prototype (bsc#1101813).
- fm10k: fix incorrect warning for function prototype (bsc#1101813).
- fm10k: fix typos on fall through comments (bsc#1101813).
- fm10k: fix typos on fall through comments (bsc#1101813).
- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813).
- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813).
- fm10k: mark pm functions as __maybe_unused (bsc#1101813).
- fm10k: mark pm functions as __maybe_unused (bsc#1101813).
- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813).
- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813).
- fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813).
- fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813).
- fm10k: prepare_for_reset() when we lose pcie Link (bsc#1101813).
- fm10k: prepare_for_reset() when we lose pcie Link (bsc#1101813).
- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813).
- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813).
- fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813).
- fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813).
- fm10k: reschedule service event if we stall the PF<->SM mailbox (bsc#1101813).
- fm10k: reschedule service event if we stall the PF->SM mailbox (bsc#1101813).
- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813).
- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813).
- fm10k: simplify reading PFVFLRE register (bsc#1101813).
- fm10k: simplify reading PFVFLRE register (bsc#1101813).
- fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813).
- fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813).
- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813).
- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813).
- fm10k: use generic pm hooks instead of legacy pcie power hooks (bsc#1101813).
- fm10k: use generic pm hooks instead of legacy pcie power hooks (bsc#1101813).
- fm10k: use macro to avoid passing the array and size separately (bsc#1101813).
- fm10k: use macro to avoid passing the array and size separately (bsc#1101813).
- fm10k: use spinlock to implement mailbox lock (bsc#1101813).
- fm10k: use spinlock to implement mailbox lock (bsc#1101813).
- fm10k: use the MAC/VLAN queue for VF<->PF MAC/VLAN requests (bsc#1101813).
- fm10k: use the MAC/VLAN queue for VF->PF MAC/VLAN requests (bsc#1101813).
- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813).
- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813).
- fm10k: warn if the stat size is unknown (bsc#1101813).
- fm10k: warn if the stat size is unknown (bsc#1101813).
- fsi: core: register with postcore_initcall (bsc#1051510).
- fuse: Remove the buggy retranslation of pids in fuse_dev_do_read (bsc#1051510).
- fuse: atomic_o_trunc should truncate pagecache (bsc#1051510).
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bsc#1051510).
- fuse: fix congested state leak on aborted connections (bsc#1051510).
- fuse: fix control dir setup and teardown (bsc#1051510).
- gpio: acpi: work around false-positive -Wstring-overflow warning (bsc#1051510).
- gpio: brcmstb: allow all instances to be wakeup sources (bsc#1051510).
- gpio: brcmstb: check return value of gpiochip_irqchip_add() (bsc#1051510).
- gpio: brcmstb: correct the configuration of level interrupts (bsc#1051510).
- gpio: brcmstb: release the bgpio lock during irq handlers (bsc#1051510).
- gpio: brcmstb: switch to handle_level_irq flow (bsc#1051510).
- gpio: pca953x: fix vendor prefix for PCA9654 (bsc#1051510).
- gpio: reject invalid gpio before getting gpio_desc (bsc#1051510).
- gpio: tegra: fix unbalanced chained_irq_enter/exit (bsc#1051510).
- gpu: host1x: Acquire a reference to the IOVA cache (bsc#1090888).
- hwmon: (aspeed-pwm) add THERMAL dependency (bsc#1051510).
- hwmon: (ftsteutates) Fix clearing alarm sysfs entries (bsc#1051510).
- hwmon: (ltc2990) Fix incorrect conversion of negative temperatures (bsc#1051510).
- hwmon: (nct6683) Enable EC access if disabled at boot (bsc#1051510).
- hwmon: (stts751) buffer overrun on wrong chip configuration (bsc#1051510).
- hwmon: (tmp102) Fix first temperature reading (bsc#1051510).
- hwmon: Deal with errors from the thermal subsystem (bsc#1051510).
- hwrng: stm32 - add reset during probe (bsc#1051510).
- i2c: axxia: enable clock before calling clk_get_rate() (bsc#1051510).
- i2c: designware: Round down ACPI provided clk to nearest supported clk (bsc#1051510).
- i2c: mux: pinctrl: mention correct module name in Kconfig help text (bsc#1051510).
- i2c: tegra: Fix NACK error handling (bsc#1051510).
- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816).
- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816).
- i40e/i40evf: Bump driver versions (bsc#1101816).
- i40e/i40evf: Bump driver versions (bsc#1101816).
- i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816).
- i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816).
- i40e/i40evf: Clean-up of bits related to using q_vector->reg_idx (bsc#1101816).
- i40e/i40evf: Clean-up of bits related to using q_vector->reg_idx (bsc#1101816).
- i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816).
- i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816).
- i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816).
- i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816).
- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816).
- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816).
- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816).
- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816).
- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816).
- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816).
- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816).
- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816).
- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816).
- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816).
- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816).
- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816).
- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816).
- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816).
- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816).
- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816).
- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816).
- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816).
- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816).
- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816).
- i40e/i40evf: do not trust VF to reset itself (bsc#1101816).
- i40e/i40evf: do not trust VF to reset itself (bsc#1101816).
- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816).
- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816).
- i40e/i40evf: organize and re-number feature flags (bsc#1101816).
- i40e/i40evf: organize and re-number feature flags (bsc#1101816).
- i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816).
- i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816).
- i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816).
- i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816).
- i40e/i40evf: use SW variables for hang detection (bsc#1101816).
- i40e/i40evf: use SW variables for hang detection (bsc#1101816).
- i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816).
- i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816).
- i40e: Add advertising 10G LR mode (bsc#1101816).
- i40e: Add advertising 10G LR mode (bsc#1101816).
- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816).
- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816).
- i40e: Add infrastructure for queue channel support (bsc#1101816).
- i40e: Add infrastructure for queue channel support (bsc#1101816).
- i40e: Add macro for PF reset bit (bsc#1101816).
- i40e: Add macro for PF reset bit (bsc#1101816).
- i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816).
- i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816).
- i40e: Add returning AQ critical error to SW (bsc#1101816).
- i40e: Add returning AQ critical error to SW (bsc#1101816).
- i40e: Add support for 'ethtool -m' (bsc#1101816).
- i40e: Add support for 'ethtool -m' (bsc#1101816).
- i40e: Cleanup i40e_vlan_rx_register (bsc#1101816).
- i40e: Cleanup i40e_vlan_rx_register (bsc#1101816).
- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816).
- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816).
- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816).
- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816).
- i40e: Display error message if module does not meet thermal requirements (bsc#1101816).
- i40e: Display error message if module does not meet thermal requirements (bsc#1101816).
- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816).
- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816).
- i40e: Fix FLR reset timeout issue (bsc#1101816).
- i40e: Fix FLR reset timeout issue (bsc#1101816).
- i40e: Fix a potential NULL pointer dereference (bsc#1101816).
- i40e: Fix a potential NULL pointer dereference (bsc#1101816).
- i40e: Fix for NUP NVM image downgrade failure (bsc#1101816).
- i40e: Fix for NUP NVM image downgrade failure (bsc#1101816).
- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816).
- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816).
- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816).
- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816).
- i40e: Fix kdump failure (bsc#1101816).
- i40e: Fix kdump failure (bsc#1101816).
- i40e: Fix link down message when interface is brought up (bsc#1101816).
- i40e: Fix link down message when interface is brought up (bsc#1101816).
- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816).
- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816).
- i40e: Fix permission check for VF MAC filters (bsc#1101816).
- i40e: Fix permission check for VF MAC filters (bsc#1101816).
- i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816).
- i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816).
- i40e: Fix reporting of supported link modes (bsc#1101816).
- i40e: Fix reporting of supported link modes (bsc#1101816).
- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816).
- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816).
- i40e: Fix unqualified module message while bringing link up (bsc#1101816).
- i40e: Fix unqualified module message while bringing link up (bsc#1101816).
- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816).
- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816).
- i40e: Prevent setting link speed on KX_X722 (bsc#1101816).
- i40e: Prevent setting link speed on KX_X722 (bsc#1101816).
- i40e: Properly maintain flow director filters list (bsc#1101816).
- i40e: Properly maintain flow director filters list (bsc#1101816).
- i40e: Remove limit of 64 max queues per channel (bsc#1101816).
- i40e: Remove limit of 64 max queues per channel (bsc#1101816).
- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816).
- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816).
- i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816).
- i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816).
- i40e: add check for return from find_first_bit call (bsc#1101816).
- i40e: add check for return from find_first_bit call (bsc#1101816).
- i40e: add doxygen comment for new mode parameter (bsc#1101816).
- i40e: add doxygen comment for new mode parameter (bsc#1101816).
- i40e: add function doc headers for ethtool stats functions (bsc#1101816).
- i40e: add function doc headers for ethtool stats functions (bsc#1101816).
- i40e: add function header for i40e_get_rxfh (bsc#1101816).
- i40e: add function header for i40e_get_rxfh (bsc#1101816).
- i40e: add helper conversion function for link_speed (bsc#1101816).
- i40e: add helper conversion function for link_speed (bsc#1101816).
- i40e: add tx_busy to ethtool stats (bsc#1101816).
- i40e: add tx_busy to ethtool stats (bsc#1101816).
- i40e: allow XPS with QoS enabled (bsc#1101816).
- i40e: allow XPS with QoS enabled (bsc#1101816).
- i40e: always return VEB stat strings (bsc#1101816).
- i40e: always return VEB stat strings (bsc#1101816).
- i40e: always return all queue stat strings (bsc#1101816).
- i40e: always return all queue stat strings (bsc#1101816).
- i40e: avoid divide by zero (bsc#1101816).
- i40e: avoid divide by zero (bsc#1101816).
- i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816).
- i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816).
- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816).
- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816).
- i40e: calculate ethtool stats size in a separate function (bsc#1101816).
- i40e: calculate ethtool stats size in a separate function (bsc#1101816).
- i40e: change flags to use 64 bits (bsc#1101816).
- i40e: change flags to use 64 bits (bsc#1101816).
- i40e: change ppp name to ddp (bsc#1101816).
- i40e: change ppp name to ddp (bsc#1101816).
- i40e: check for invalid DCB config (bsc#1101816).
- i40e: check for invalid DCB config (bsc#1101816).
- i40e: cleanup unnecessary parens (bsc#1101816).
- i40e: cleanup unnecessary parens (bsc#1101816).
- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816).
- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816).
- i40e: cleanup wording in a header comment (bsc#1101816).
- i40e: cleanup wording in a header comment (bsc#1101816).
- i40e: convert i40e_get_settings_link_up to new API (bsc#1101816).
- i40e: convert i40e_get_settings_link_up to new API (bsc#1101816).
- i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816).
- i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816).
- i40e: convert i40e_set_link_ksettings to new API (bsc#1101816).
- i40e: convert i40e_set_link_ksettings to new API (bsc#1101816).
- i40e: disallow programming multiple filters with same criteria (bsc#1101816).
- i40e: disallow programming multiple filters with same criteria (bsc#1101816).
- i40e: display priority_xon and priority_xoff stats (bsc#1101816).
- i40e: display priority_xon and priority_xoff stats (bsc#1101816).
- i40e: do not clear suspended state until we finish resuming (bsc#1101816).
- i40e: do not clear suspended state until we finish resuming (bsc#1101816).
- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816).
- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816).
- i40e: do not force filter failure in overflow promiscuous (bsc#1101816).
- i40e: do not force filter failure in overflow promiscuous (bsc#1101816).
- i40e: do not hold spinlock while resetting VF (bsc#1101816).
- i40e: do not hold spinlock while resetting VF (bsc#1101816).
- i40e: do not leak memory addresses (bsc#1101816).
- i40e: do not leak memory addresses (bsc#1101816).
- i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816).
- i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816).
- i40e: ensure reset occurs when disabling VF (bsc#1101816).
- i40e: ensure reset occurs when disabling VF (bsc#1101816).
- i40e: factor out re-enable functions for ATR and SB (bsc#1101816).
- i40e: factor out re-enable functions for ATR and SB (bsc#1101816).
- i40e: fix a typo (bsc#1101816).
- i40e: fix a typo (bsc#1101816).
- i40e: fix a typo in i40e_pf documentation (bsc#1101816).
- i40e: fix a typo in i40e_pf documentation (bsc#1101816).
- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816).
- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816).
- i40e: fix comment typo (bsc#1101816).
- i40e: fix comment typo (bsc#1101816).
- i40e: fix flags declaration (bsc#1101816).
- i40e: fix flags declaration (bsc#1101816).
- i40e: fix for flow director counters not wrapping as expected (bsc#1101816).
- i40e: fix for flow director counters not wrapping as expected (bsc#1101816).
- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816).
- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816).
- i40e: fix handling of vf_states variable (bsc#1101816).
- i40e: fix handling of vf_states variable (bsc#1101816).
- i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816).
- i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816).
- i40e: fix incorrect register definition (bsc#1101816).
- i40e: fix incorrect register definition (bsc#1101816).
- i40e: fix link reporting (bsc#1101816).
- i40e: fix link reporting (bsc#1101816).
- i40e: fix merge error (bsc#1101816).
- i40e: fix merge error (bsc#1101816).
- i40e: fix reading LLDP configuration (bsc#1101816).
- i40e: fix reading LLDP configuration (bsc#1101816).
- i40e: fix typo in function description (bsc#1101816).
- i40e: fix typo in function description (bsc#1101816).
- i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816).
- i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816).
- i40e: fold prefix strings directly into stat names (bsc#1101816).
- i40e: fold prefix strings directly into stat names (bsc#1101816).
- i40e: free skb after clearing lock in ptp_stop (bsc#1101816).
- i40e: free skb after clearing lock in ptp_stop (bsc#1101816).
- i40e: free the skb after clearing the bitlock (bsc#1101816).
- i40e: free the skb after clearing the bitlock (bsc#1101816).
- i40e: group autoneg PHY types together (bsc#1101816).
- i40e: group autoneg PHY types together (bsc#1101816).
- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816).
- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816).
- i40e: ignore skb->xmit_more when deciding to set RS bit (bsc#1101816).
- i40e: ignore skb->xmit_more when deciding to set RS bit (bsc#1101816).
- i40e: implement split pci error reset handler (bsc#1101816).
- i40e: implement split pci error reset handler (bsc#1101816).
- i40e: limit lan queue count in large CPU count machine (bsc#1101816).
- i40e: limit lan queue count in large CPU count machine (bsc#1101816).
- i40e: make const array patterns static, reduces object code size (bsc#1101816).
- i40e: make const array patterns static, reduces object code size (bsc#1101816).
- i40e: make i40evf_map_rings_to_vectors void (bsc#1101816).
- i40e: make i40evf_map_rings_to_vectors void (bsc#1101816).
- i40e: make use of i40e_vc_disable_vf (bsc#1101816).
- i40e: make use of i40e_vc_disable_vf (bsc#1101816).
- i40e: mark pm functions as __maybe_unused (bsc#1101816).
- i40e: mark pm functions as __maybe_unused (bsc#1101816).
- i40e: move AUTO_DISABLED flags into the state field (bsc#1101816).
- i40e: move AUTO_DISABLED flags into the state field (bsc#1101816).
- i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816).
- i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816).
- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816).
- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816).
- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816).
- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816).
- i40e: move client flags into state bits (bsc#1101816).
- i40e: move client flags into state bits (bsc#1101816).
- i40e: prevent service task from running while we're suspended (bsc#1101816).
- i40e: prevent service task from running while we're suspended (bsc#1101816).
- i40e: re-enable PTP L4 capabilities for XL710 if FW >6.0 (bsc#1101816).
- i40e: re-enable PTP L4 capabilities for XL710 if FW >6.0 (bsc#1101816).
- i40e: re-number feature flags to remove gaps (bsc#1101816).
- i40e: re-number feature flags to remove gaps (bsc#1101816).
- i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816).
- i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816).
- i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816).
- i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816).
- i40e: refactor FW version checking (bsc#1101816).
- i40e: refactor FW version checking (bsc#1101816).
- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816).
- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816).
- i40e: relax warning message in case of version mismatch (bsc#1101816).
- i40e: relax warning message in case of version mismatch (bsc#1101816).
- i40e: remove duplicate pfc stats (bsc#1101816).
- i40e: remove duplicate pfc stats (bsc#1101816).
- i40e: remove i40e_fcoe files (bsc#1101816).
- i40e: remove i40e_fcoe files (bsc#1101816).
- i40e: remove ifdef SPEED_25000 (bsc#1101816).
- i40e: remove ifdef SPEED_25000 (bsc#1101816).
- i40e: remove logically dead code (bsc#1101816).
- i40e: remove logically dead code (bsc#1101816).
- i40e: remove redundant initialization of read_size (bsc#1101816).
- i40e: remove redundant initialization of read_size (bsc#1101816).
- i40e: rename 'change' variable to 'autoneg_changed' (bsc#1101816).
- i40e: rename 'change' variable to 'autoneg_changed' (bsc#1101816).
- i40e: rename 'cmd' variables in ethtool interface (bsc#1101816).
- i40e: rename 'cmd' variables in ethtool interface (bsc#1101816).
- i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816).
- i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816).
- i40e: restore promiscuous after reset (bsc#1101816).
- i40e: restore promiscuous after reset (bsc#1101816).
- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816).
- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816).
- i40e: simplify member variable accesses (bsc#1101816).
- i40e: simplify member variable accesses (bsc#1101816).
- i40e: split i40e_get_strings() into smaller functions (bsc#1101816).
- i40e: split i40e_get_strings() into smaller functions (bsc#1101816).
- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816).
- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816).
- i40e: track filter type statistics when deleting invalid filters (bsc#1101816).
- i40e: track filter type statistics when deleting invalid filters (bsc#1101816).
- i40e: track id can be 0 (bsc#1101816).
- i40e: track id can be 0 (bsc#1101816).
- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816).
- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816).
- i40e: update data pointer directly when copying to the buffer (bsc#1101816).
- i40e: update data pointer directly when copying to the buffer (bsc#1101816).
- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816).
- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816).
- i40e: use a local variable instead of calculating multiple times (bsc#1101816).
- i40e: use a local variable instead of calculating multiple times (bsc#1101816).
- i40e: use admin queue for setting LEDs behavior (bsc#1101816).
- i40e: use admin queue for setting LEDs behavior (bsc#1101816).
- i40e: use newer generic pm support instead of legacy pm callbacks (bsc#1101816).
- i40e: use newer generic pm support instead of legacy pm callbacks (bsc#1101816).
- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816).
- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816).
- i40e: use the more traditional 'i' loop variable (bsc#1101816).
- i40e: use the more traditional 'i' loop variable (bsc#1101816).
- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816).
- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816).
- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816).
- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816).
- i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816).
- i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816).
- i40evf: Do not clear MSI-X PBA manually (bsc#1101816).
- i40evf: Do not clear MSI-X PBA manually (bsc#1101816).
- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816).
- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816).
- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816).
- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816).
- i40evf: Fix a hardware reset support in VF driver (bsc#1101816).
- i40evf: Fix a hardware reset support in VF driver (bsc#1101816).
- i40evf: Fix double locking the same resource (bsc#1101816).
- i40evf: Fix double locking the same resource (bsc#1101816).
- i40evf: Fix link up issue when queues are disabled (bsc#1101816).
- i40evf: Fix link up issue when queues are disabled (bsc#1101816).
- i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816).
- i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816).
- i40evf: Make VF reset warning message more clear (bsc#1101816).
- i40evf: Make VF reset warning message more clear (bsc#1101816).
- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816).
- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816).
- i40evf: Use an iterator of the same type as the list (bsc#1101816).
- i40evf: Use an iterator of the same type as the list (bsc#1101816).
- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816).
- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816).
- i40evf: fix client notify of l2 params (bsc#1101816).
- i40evf: fix client notify of l2 params (bsc#1101816).
- i40evf: fix ring to vector mapping (bsc#1101816).
- i40evf: fix ring to vector mapping (bsc#1101816).
- i40evf: hold the critical task bit lock while opening (bsc#1101816).
- i40evf: hold the critical task bit lock while opening (bsc#1101816).
- i40evf: lower message level (bsc#1101816).
- i40evf: lower message level (bsc#1101816).
- i40evf: release bit locks in reverse order (bsc#1101816).
- i40evf: release bit locks in reverse order (bsc#1101816).
- i40evf: remove flags that are never used (bsc#1101816).
- i40evf: remove flags that are never used (bsc#1101816).
- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816).
- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816).
- i40evf: use GFP_ATOMIC under spin lock (bsc#1101816).
- i40evf: use GFP_ATOMIC under spin lock (bsc#1101816).
- i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816).
- i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816).
- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816).
- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816).
- i40iw: Fix memory leak in error path of create QP (bsc#1058659).
- i40iw: Fix memory leak in error path of create QP (bsc#1058659).
- i40iw: Refactor of driver generated AEs (bsc#1058659).
- i40iw: Refactor of driver generated AEs (bsc#1058659).
- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659).
- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659).
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659).
- ib/core: Fix error code for invalid GID entry (bsc#1046306).
- ib/core: Fix error code for invalid GID entry (bsc#1046306).
- ib/core: Honor port_num while resolving GID for ib link layer (bsc#1046306).
- ib/core: Honor port_num while resolving GID for ib link layer (bsc#1046306).
- ib/core: Make ib_mad_client_id atomic (bsc#1046306).
- ib/core: Make ib_mad_client_id atomic (bsc#1046306).
- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306).
- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306).
- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306).
- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306).
- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463).
- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463).
- ib/hfi1: Fix fault injection init/exit issues (bsc#1060463).
- ib/hfi1: Fix fault injection init/exit issues (bsc#1060463).
- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463).
- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463).
- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463).
- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463).
- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463).
- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463).
- ib/iser: Do not reduce max_sectors (bsc#1046306).
- ib/iser: Do not reduce max_sectors (bsc#1046306).
- ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306).
- ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306).
- ib/isert: fix T10-pi check mask setting (bsc#1046306).
- ib/isert: fix T10-pi check mask setting (bsc#1046306).
- ib/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()' (bsc#1046302).
- ib/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()' (bsc#1046302).
- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302).
- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302).
- ib/mlx5: Fetch soft WQE's on fatal error state (bsc#1046305).
- ib/mlx5: Fetch soft WQE's on fatal error state (bsc#1046305).
- ib/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046305).
- ib/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046305).
- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301).
- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301).
- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306).
- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306).
- ib/rxe: add RXE_START_MASK for rxe_opcode ib_OPCODE_RC_SEND_ONLY_INV (bsc#1046306).
- ib/rxe: add RXE_START_MASK for rxe_opcode ib_OPCODE_RC_SEND_ONLY_INV (bsc#1046306).
- ib/rxe: avoid double kfree_skb (bsc#1046306).
- ib/rxe: avoid double kfree_skb (bsc#1046306).
- ib/umem: Use the correct mm during ib_umem_release (bsc#1046306).
- ib/umem: Use the correct mm during ib_umem_release (bsc#1046306).
- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306).
- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- igb: Fix not adding filter elements to the list (bsc#1056651).
- igb: Fix not adding filter elements to the list (bsc#1056651).
- igb: Fix queue selection on MAC filters on i210 (bsc#1056651).
- igb: Fix queue selection on MAC filters on i210 (bsc#1056651).
- iio: BME280: Updates to Humidity readings need ctrl_reg write! (bsc#1051510).
- iio: accel: st_accel: fix data-ready line configuration (bsc#1051510).
- iio: accel: st_accel_i2c: fix i2c_device_id table (bsc#1051510).
- iio: accel: st_accel_spi: fix spi_device_id table (bsc#1051510).
- iio: adc: sun4i-gpadc-iio: fix unbalanced irq enable/disable (bsc#1051510).
- iio: adc: twl4030: Return an error if we can not enable the vusb3v1 regulator in 'twl4030_madc_probe()' (bsc#1051510).
- iio: gyro: st_gyro: fix L3GD20H support (bsc#1051510).
- iio: humidity: hts221: remove warnings in hts221_parse_{temp,rh}_caldata() (bsc#1051510).
- iio: imu: inv_mpu6050: test whoami first and against all known values (bsc#1051510).
- iio: magnetometer: st_magn: fix drdy line configuration for LIS3MDL (bsc#1051510).
- iio: magnetometer: st_magn_core: enable multiread by default for LIS3MDL (bsc#1051510).
- iio: magnetometer: st_magn_spi: fix spi_device_id table (bsc#1051510).
- iio: pressure: bmp280: fix relative humidity unit (bsc#1051510).
- iio: pressure: st_pressure: fix drdy configuration for LPS22HB and LPS25H (bsc#1051510).
- iio: pressure: zpa2326: Remove always-true check which confuses gcc (bsc#1051510).
- iio: pressure: zpa2326: report interrupted case as failure (bsc#1051510).
- iio: trigger: stm32-timer: fix quadrature mode get routine (bsc#1051510).
- iio: trigger: stm32-timer: fix write_raw return value (bsc#1051510).
- iio: tsl2583: correct values in integration_time_available (bsc#1051510).
- infiniband: fix a possible use-after-free bug (bsc#1046306).
- infiniband: fix a possible use-after-free bug (bsc#1046306).
- iommu/vt-d: Clear Page Request Overflow fault bit ().
- iommu/vt-d: Clear Page Request Overflow fault bit ().
- ip6_tunnel: remove magic mtu value 0xFFF8 (networking-stable-18_06_08).
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1102512).
- ipmr: properly check rhltable_init() return value (networking-stable-18_06_08).
- ipv4: remove warning in ip_recv_error (networking-stable-18_06_08).
- ipv6: allow pmTU exceptions to local routes (networking-stable-18_06_20).
- ipv6: sr: fix memory OOB access in seg6_do_srh_encap/inline (networking-stable-18_06_08).
- iw_cxgb4: Add ib_device->get_netdev support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543).
- iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543).
- iw_cxgb4: initialize ib_mr fields for user mrs (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674).
- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674).
- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674).
- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674).
- ixgbe: Add receive length error counter (bsc#1101674).
- ixgbe: Add receive length error counter (bsc#1101674).
- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674).
- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674).
- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674).
- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674).
- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674).
- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674).
- ixgbe: Clear SWFW_SYNC register during init (bsc#1101674).
- ixgbe: Clear SWFW_SYNC register during init (bsc#1101674).
- ixgbe: Default to 1 pool always being allocated (bsc#1101674).
- ixgbe: Default to 1 pool always being allocated (bsc#1101674).
- ixgbe: Do not assume dev->num_tc is equal to hardware TC config (bsc#1101674).
- ixgbe: Do not assume dev->num_tc is equal to hardware TC config (bsc#1101674).
- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674).
- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674).
- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674).
- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674).
- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674).
- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674).
- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674).
- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674).
- ixgbe: Fix && vs || typo (bsc#1101674).
- ixgbe: Fix handling of macvlan Tx offload (bsc#1101674).
- ixgbe: Fix handling of macvlan Tx offload (bsc#1101674).
- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674).
- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674).
- ixgbe: Fix kernel-doc format warnings (bsc#1101674).
- ixgbe: Fix kernel-doc format warnings (bsc#1101674).
- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674).
- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674).
- ixgbe: Fix logic operator typo (bsc#1101674).
- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674).
- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674).
- ixgbe: Perform reinit any time number of VFs change (bsc#1101674).
- ixgbe: Perform reinit any time number of VFs change (bsc#1101674).
- ixgbe: Remove an obsolete comment about ITR (bsc#1101674).
- ixgbe: Remove an obsolete comment about ITR (bsc#1101674).
- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674).
- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674).
- ixgbe: Update adaptive ITR algorithm (bsc#1101674).
- ixgbe: Update adaptive ITR algorithm (bsc#1101674).
- ixgbe: Use ring values to test for Tx pending (bsc#1101674).
- ixgbe: Use ring values to test for Tx pending (bsc#1101674).
- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674).
- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674).
- ixgbe: add error checks when initializing the PHY (bsc#1101674).
- ixgbe: add error checks when initializing the PHY (bsc#1101674).
- ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674).
- ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674).
- ixgbe: add support for reporting 5G link speed (bsc#1101674).
- ixgbe: add support for reporting 5G link speed (bsc#1101674).
- ixgbe: advertise highest capable link speed (bsc#1101674).
- ixgbe: advertise highest capable link speed (bsc#1101674).
- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674).
- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674).
- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674).
- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674).
- ixgbe: enable multicast on shutdown for WOL (bsc#1101674).
- ixgbe: enable multicast on shutdown for WOL (bsc#1101674).
- ixgbe: extend firmware version support (bsc#1101674).
- ixgbe: extend firmware version support (bsc#1101674).
- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674).
- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674).
- ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674).
- ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674).
- ixgbe: fix possible race in reset subtask (bsc#1101674).
- ixgbe: fix possible race in reset subtask (bsc#1101674).
- ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674).
- ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674).
- ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674).
- ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674).
- ixgbe: force VF to grab new MAC on driver reload (bsc#1101674).
- ixgbe: force VF to grab new MAC on driver reload (bsc#1101674).
- ixgbe: introduce a helper to simplify code (bsc#1101674).
- ixgbe: introduce a helper to simplify code (bsc#1101674).
- ixgbe: remove redundant initialization of 'pool' (bsc#1101674).
- ixgbe: remove redundant initialization of 'pool' (bsc#1101674).
- ixgbe: remove unused enum latency_range (bsc#1101674).
- ixgbe: remove unused enum latency_range (bsc#1101674).
- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674).
- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674).
- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674).
- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674).
- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674).
- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674).
- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674).
- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674).
- ixgbevf: Fix kernel-doc format warnings (bsc#1101674).
- ixgbevf: Fix kernel-doc format warnings (bsc#1101674).
- ixgbevf: add build_skb support (bsc#1101674).
- ixgbevf: add build_skb support (bsc#1101674).
- ixgbevf: add counters for Rx page allocations (bsc#1101674).
- ixgbevf: add counters for Rx page allocations (bsc#1101674).
- ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674).
- ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674).
- ixgbevf: add function for checking if we can reuse page (bsc#1101674).
- ixgbevf: add function for checking if we can reuse page (bsc#1101674).
- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674).
- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674).
- ixgbevf: add support for padding packet (bsc#1101674).
- ixgbevf: add support for padding packet (bsc#1101674).
- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674).
- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674).
- ixgbevf: allocate the rings as part of q_vector (bsc#1101674).
- ixgbevf: allocate the rings as part of q_vector (bsc#1101674).
- ixgbevf: break out Rx buffer page management (bsc#1101674).
- ixgbevf: break out Rx buffer page management (bsc#1101674).
- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674).
- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674).
- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674).
- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674).
- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674).
- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674).
- ixgbevf: fix ixgbevf_xmit_frame()'s return type (bsc#1101674).
- ixgbevf: fix ixgbevf_xmit_frame()'s return type (bsc#1101674).
- ixgbevf: fix possible race in the reset subtask (bsc#1101674).
- ixgbevf: fix possible race in the reset subtask (bsc#1101674).
- ixgbevf: fix unused variable warning (bsc#1101674).
- ixgbevf: fix unused variable warning (bsc#1101674).
- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674).
- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674).
- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674).
- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674).
- ixgbevf: only DMA sync frame length (bsc#1101674).
- ixgbevf: only DMA sync frame length (bsc#1101674).
- ixgbevf: remove redundant initialization of variable 'dma' (bsc#1101674).
- ixgbevf: remove redundant initialization of variable 'dma' (bsc#1101674).
- ixgbevf: remove redundant setting of xcast_mode (bsc#1101674).
- ixgbevf: remove redundant setting of xcast_mode (bsc#1101674).
- ixgbevf: setup queue counts (bsc#1101674).
- ixgbevf: setup queue counts (bsc#1101674).
- ixgbevf: update code to better handle incrementing page count (bsc#1101674).
- ixgbevf: update code to better handle incrementing page count (bsc#1101674).
- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674).
- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674).
- ixgbevf: use length to determine if descriptor is done (bsc#1101674).
- ixgbevf: use length to determine if descriptor is done (bsc#1101674).
- ixgbevf: use page_address offset from page (bsc#1101674).
- ixgbevf: use page_address offset from page (bsc#1101674).
- jump_label: Add branch hints to static_branch_{un,}likely() (bnc#1101669 optimise numa balancing for fast migrate).
- kABI: fixes for nvme (bsc#1077989).
- kABI: fixes for qla2xxx (bsc#1077989).
- kabi mlx5 hide cpu_rmap (bsc#1046303).
- kabi/severities: add qed inter module symbols to kabi ignore list
- kabi: breakage for of/device change (bsc#1051510).
- kabi: cxgb4 MU (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- kabi: due to perf_event.h uapi field change ().
- kabi: for rtl_deinit_deferred_work() rewrite (bsc#1051510).
- kabi: mlx5 hide cpu_rmap (bsc#1046303).
- kabi: mvpp2 10gkr support (bsc#1098633).
- kabi: powerpc: mmu_context: provide old version of mm_iommu_ua_to_hpa (bsc#1077761, git-fixes).
- kabi: protect fwnode_handle (bsc#1098633).
- kcm: Fix use-after-free caused by clonned sockets (networking-stable-18_06_08).
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1051510).
- keys: DNS: fix parsing multiple options (bsc#1051510).
- kvm: PPC: Check if IOMMU page is contained in the pinned physical page (bsc#1077761, git-fixes).
- kvm: x86: fix vcpu initialization with userspace lapic (bsc#1101564).
- kvm: x86: move LAPIC initialization after VMCS creation (bsc#1101564).
- libnvdimm, label: fix index block size calculation (bsc#1102147).
- libnvdimm: add an api to cast a 'struct nd_region' to its 'struct device' (bsc#1094119).
- mailbox: PCC: erroneous error message when parsing ACPI PCCT (bsc#1096330).
- mailbox: bcm2835: Fix of_xlate return value (bsc#1051510).
- mdio-sun4i: Fix a memory leak (bsc#1051510).
- media: coda/imx-vdoa: Check for platform_get_resource() error (bsc#1051510).
- media: cx25840: Use subdev host data for PLL override (bsc#1051510).
- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1051510).
- media: cxusb: restore RC_MAP for MyGica T230 (bsc#1051510).
- media: dt-bindings: media: rcar_vin: Use status 'okay' (bsc#1051510).
- media: dvb-core: always call invoke_release() in fe_free() (bsc#1051510).
- media: dvb_frontend: fix ifnullfree.cocci warnings (bsc#1051510).
- media: dvb_frontend: only use kref after initialized (bsc#1051510).
- media: dvb_net: ensure that dvb_net_ule_handle is fully initialized (bsc#1051510).
- media: mxl111sf: Fix potential null pointer dereference (bsc#1051510).
- media: omap3isp/isp: remove an unused static var (bsc#1051510).
- media: s5p-jpeg: fix number of components macro (bsc#1051510).
- media: s5p-mfc: Fix lock contention - request_firmware() once (bsc#1051510).
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bsc#1051510).
- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#1051510).
- mfd: tps65218: Reorder tps65218_regulator_id enum (bsc#1051510).
- mfd: tps65911-comparator: Fix a build error (bsc#1051510).
- mfd: tps65911-comparator: Fix an off by one bug (bsc#1051510).
- mlxsw: spectrum: Forbid creation of VLAN 1 over port/LAG (networking-stable-18_06_08).
- mmc: cavium: Fix use-after-free in of_platform_device_destroy (bsc#1051510).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1051510).
- mmc: meson-gx: remove CLK_DIVIDER_ALLOW_ZERO clock flag (bsc#1051510).
- mmc: sdhci-msm: fix issue with power irq (bsc#1051510).
- mmc: sdhci-of-esdhc: disable SD clock for clock value 0 (bsc#1051510).
- mmc: sdhci-of-esdhc: fix eMMC couldn't work after kexec (bsc#1051510).
- mmc: sdhci-of-esdhc: fix the mmc error after sleep on ls1046ardb (bsc#1051510).
- mmc: sdhci-xenon: Fix clock resource by adding an optional bus clock (bsc#1051510).
- mmc: sdhci-xenon: wait 5ms after set 1.8V signal enable (bsc#1051510).
- mmc: tmio: remove outdated comment (bsc#1051510).
- modsign: log module name in the event of an error (bsc#1093666).
- modsign: print module name along with error message (bsc#1093666).
- module: make it clear when we're handling the module copy in info->hdr (bsc#1093666).
- module: setup load info before module_sig_check() (bsc#1093666).
- mvpp2: fix multicast address filter (bsc#1098633).
- net-sysfs: Fix memory leak in XPS configuration (networking-stable-18_06_08).
- net/mlx4: Fix irq-unsafe spinlock usage (networking-stable-18_06_08).
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300).
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300).
- net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299).
- net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299).
- net/mlx5: Adjust clock overflow work period (bsc#1046303).
- net/mlx5: Adjust clock overflow work period (bsc#1046303).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303).
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303).
- net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303).
- net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303).
- net/mlx5: Fix command interface race in polling mode (bsc#1046300).
- net/mlx5: Fix command interface race in polling mode (bsc#1046300).
- net/mlx5: Fix dump_command mailbox length printed (bsc#1046303).
- net/mlx5: Fix dump_command mailbox length printed (bsc#1046303).
- net/mlx5: Fix incorrect raw command length parsing (bsc#1046300).
- net/mlx5: Fix incorrect raw command length parsing (bsc#1046300).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300).
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300).
- net/mlx5: Free IRQs in shutdown path (bsc#1046303).
- net/mlx5: Free IRQs in shutdown path (bsc#1046303).
- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303).
- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303).
- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303).
- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303).
- net/mlx5: Protect from command bit overflow (bsc#1046303).
- net/mlx5: Protect from command bit overflow (bsc#1046303).
- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303).
- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303).
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303).
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303).
- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300).
- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303).
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303).
- net/mlx5e: Refine ets validation function (bsc#1075360).
- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303).
- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303).
- net/mlx5e: When RXFCS is set, add FCS data into checksum calculation (networking-stable-18_06_08).
- net/packet: refine check for priv area size (networking-stable-18_06_08).
- net/sched: act_simple: fix parsing of TCA_DEF_DATA (networking-stable-18_06_20).
- net/sched: act_tunnel_key: fix NULL dereference when 'goto chain' is used (bsc#1056787).
- net/sched: fix NULL dereference in the error path of tcf_sample_init() (bsc#1056787).
- net: add rb_to_skb() and other rb tree helpers (bsc#1102340).
- net: cxgb3_main: fix potential Spectre v1 (bsc#1046533).
- net: cxgb3_main: fix potential Spectre v1 (bsc#1046533).
- net: define the TSO header size in net/tso.h (bsc#1098633).
- net: dsa: add error handling for pskb_trim_rcsum (networking-stable-18_06_20).
- net: ethernet: davinci_emac: fix error handling in probe() (networking-stable-18_06_08).
- net: ethernet: ti: cpdma: correct error handling for chan create (networking-stable-18_06_08).
- net: ethtool: Add macro to clear a link mode setting (bsc#1101816).
- net: ethtool: Add macro to clear a link mode setting (bsc#1101816).
- net: in virtio_net_hdr only add VLAN_HLEN to csum_start if payload holds vlan (networking-stable-18_06_20).
- net: ipv4: add missing RTA_TABLE to rtm_ipv4_policy (networking-stable-18_06_08).
- net: metrics: add proper netlink validation (networking-stable-18_06_08).
- net: mvmdio: add xmdio xsmi support (bsc#1098633).
- net: mvmdio: check the MII_ADDR_C45 bit is not set for smi operations (bsc#1098633).
- net: mvmdio: introduce an ops structure (bsc#1098633).
- net: mvmdio: put the poll intervals in the ops structure (bsc#1098633).
- net: mvmdio: remove duplicate locking (bsc#1098633).
- net: mvmdio: reorder headers alphabetically (bsc#1098633).
- net: mvmdio: simplify the smi read and write error paths (bsc#1098633).
- net: mvmdio: use GENMASK for masks (bsc#1098633).
- net: mvmdio: use tabs for defines (bsc#1098633).
- net: mvpp2: Add hardware offloading for VLAN filtering (bsc#1098633).
- net: mvpp2: Add support for unicast filtering (bsc#1098633).
- net: mvpp2: Do not use dynamic allocs for local variables (bsc#1098633).
- net: mvpp2: Fix DMA address mask size (bsc#1098633).
- net: mvpp2: Fix TCAM filter reserved range (bsc#1098633).
- net: mvpp2: Fix clk error path in mvpp2_probe (bsc#1098633).
- net: mvpp2: Fix clock resource by adding an optional bus clock (bsc#1098633).
- net: mvpp2: Fix clock resource by adding missing mg_core_clk (bsc#1098633).
- net: mvpp2: Fix parser entry init boundary check (bsc#1098633).
- net: mvpp2: Make mvpp2_prs_hw_read a parser entry init function (bsc#1098633).
- net: mvpp2: Prevent userspace from changing TX affinities (bsc#1098633).
- net: mvpp2: Simplify MAC filtering function parameters (bsc#1098633).
- net: mvpp2: Use relaxed I/O in data path (bsc#1098633).
- net: mvpp2: add comments about smp_processor_id() usage (bsc#1098633).
- net: mvpp2: add ethtool GOP statistics (bsc#1098633).
- net: mvpp2: add support for TX interrupts and RX queue distribution modes (bsc#1098633).
- net: mvpp2: adjust the coalescing parameters (bsc#1098633).
- net: mvpp2: align values in ethtool get_coalesce (bsc#1098633).
- net: mvpp2: allocate zeroed tx descriptors (bsc#1098633).
- net: mvpp2: check ethtool sets the Tx ring size is to a valid min value (bsc#1098633).
- net: mvpp2: cleanup probed ports in the probe error path (bsc#1098633).
- net: mvpp2: do not call txq_done from the Tx path when Tx irqs are used (bsc#1098633).
- net: mvpp2: do not disable GMAC padding (bsc#1098633).
- net: mvpp2: do not select the internal source clock (bsc#1098633).
- net: mvpp2: do not set GMAC autoneg when using XLG MAC (bsc#1098633).
- net: mvpp2: do not sleep in set_rx_mode (bsc#1098633).
- net: mvpp2: do not unmap TSO headers buffers (bsc#1098633).
- net: mvpp2: dynamic reconfiguration of the comphy/GoP/MAC (bsc#1098633).
- net: mvpp2: enable ACPI support in the driver (bsc#1098633).
- net: mvpp2: enable UDP/TCP checksum over IPv6 (bsc#1098633).
- net: mvpp2: enable basic 10G support (bsc#1098633).
- net: mvpp2: fallback using h/w and random mac if the dt one isn't valid (bsc#1098633).
- net: mvpp2: fix GOP statistics loop start and stop conditions (bsc#1098633).
- net: mvpp2: fix MVPP21_ISR_RXQ_GROUP_REG definition (bsc#1098633).
- net: mvpp2: fix TSO headers allocation and management (bsc#1098633).
- net: mvpp2: fix invalid parameters order when calling the tcam init (bsc#1098633).
- net: mvpp2: fix parsing fragmentation detection (bsc#1098633).
- net: mvpp2: fix port list indexing (bsc#1098633).
- net: mvpp2: fix the RSS table entry offset (bsc#1098633).
- net: mvpp2: fix the packet size configuration for 10G (bsc#1098633).
- net: mvpp2: fix the synchronization module bypass macro name (bsc#1098633).
- net: mvpp2: fix the txq_init error path (bsc#1098633).
- net: mvpp2: fix typo in the tcam setup (bsc#1098633).
- net: mvpp2: fix use of the random mac address for PPv2.2 (bsc#1098633).
- net: mvpp2: improve the link management function (bsc#1098633).
- net: mvpp2: initialize the GMAC when using a port (bsc#1098633).
- net: mvpp2: initialize the GoP (bsc#1098633).
- net: mvpp2: initialize the RSS tables (bsc#1098633).
- net: mvpp2: initialize the Tx FIFO size (bsc#1098633).
- net: mvpp2: initialize the XLG MAC when using a port (bsc#1098633).
- net: mvpp2: initialize the comphy (bsc#1098633).
- net: mvpp2: introduce per-port nrxqs/ntxqs variables (bsc#1098633).
- net: mvpp2: introduce queue_vector concept (bsc#1098633).
- net: mvpp2: jumbo frames support (bsc#1098633).
- net: mvpp2: limit TSO segments and use stop/wake thresholds (bsc#1098633).
- net: mvpp2: make the phy optional (bsc#1098633).
- net: mvpp2: move from cpu-centric naming to 'software thread' naming (bsc#1098633).
- net: mvpp2: move the mac retrieval/copy logic into its own function (bsc#1098633).
- net: mvpp2: move the mii configuration in the ndo_open path (bsc#1098633).
- net: mvpp2: mvpp2_check_hw_buf_num() can be static (bsc#1098633).
- net: mvpp2: only free the TSO header buffers when it was allocated (bsc#1098633).
- net: mvpp2: remove RX queue group reset code (bsc#1098633).
- net: mvpp2: remove mvpp2_pool_refill() (bsc#1098633).
- net: mvpp2: remove unused mvpp2_bm_cookie_pool_set() function (bsc#1098633).
- net: mvpp2: remove useless goto (bsc#1098633).
- net: mvpp2: report the tx-usec coalescing information to ethtool (bsc#1098633).
- net: mvpp2: set maximum packet size for 10G ports (bsc#1098633).
- net: mvpp2: set the Rx FIFO size depending on the port speeds for PPv2.2 (bsc#1098633).
- net: mvpp2: simplify maintaining enabled ports' list (bsc#1098633).
- net: mvpp2: simplify the Tx desc set DMA logic (bsc#1098633).
- net: mvpp2: simplify the link_event function (bsc#1098633).
- net: mvpp2: software tso support (bsc#1098633).
- net: mvpp2: split the max ring size from the default one (bsc#1098633).
- net: mvpp2: take advantage of the is_rgmii helper (bsc#1098633).
- net: mvpp2: unify register definitions coding style (bsc#1098633).
- net: mvpp2: unify the txq size define use (bsc#1098633).
- net: mvpp2: update the BM buffer free/destroy logic (bsc#1098633).
- net: mvpp2: use a data size of 10kB for Tx FIFO on port 0 (bsc#1098633).
- net: mvpp2: use correct index on array mvpp2_pools (bsc#1098633).
- net: mvpp2: use device_*/fwnode_* APIs instead of of_* (bsc#1098633).
- net: mvpp2: use the GoP interrupt for link status changes (bsc#1098633).
- net: mvpp2: use the aggr txq size define everywhere (bsc#1098633).
- net: mvpp2: use the same buffer pool for all ports (bsc#1098633).
- net: phy: add XAUI and 10GBASE-KR PHY connection types (bsc#1098633).
- net: phy: broadcom: Fix auxiliary control register reads (networking-stable-18_06_08).
- net: phy: broadcom: Fix bcm_write_exp() (networking-stable-18_06_08).
- net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE for DP83620 (networking-stable-18_06_20).
- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301).
- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301).
- net: sched: red: avoid hashing NULL child (bsc#1056787).
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (networking-stable-18_06_08).
- netdev-FAQ: clarify DaveM's position for stable backports (networking-stable-18_06_08).
- nfc: nfcmrvl_uart: fix device-node leak during probe (bsc#1051510).
- nfc: pn533: Fix wrong GFP flag usage (bsc#1051510).
- nfit, address-range-scrub: add module option to skip initial ars (bsc#1094119).
- nfit, address-range-scrub: determine one platform max_ars value (bsc#1094119).
- nfit, address-range-scrub: fix scrub in-progress reporting (bsc#1051510).
- nfit, address-range-scrub: introduce nfit_spa->ars_state (bsc#1094119).
- nfit, address-range-scrub: rework and simplify ARS state machine (bsc#1094119).
- nfit: fix region registration vs block-data-window ranges (bsc#1051510).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1051510).
- nvme-loop: add support for multiple ports (bsc#1054245).
- nvme.h: add AEN configuration symbols (bsc#1054245).
- nvme.h: add ANA definitions (bsc#1054245).
- nvme.h: add support for the log specific field (bsc#1054245).
- nvme.h: add the changed namespace list log (bsc#1054245).
- nvme.h: untangle AEN notice definitions (bsc#1054245).
- nvme/multipath: Disable runtime writable enabling parameter (bsc#1054245).
- nvme: Fix sync controller reset return (bsc#1077989).
- nvme: add ANA support (bsc#1054245).
- nvme: add bio remapping tracepoint (bsc#1054245).
- nvme: centralize ctrl removal prints (bsc#1054245).
- nvme: cleanup double shift issue (bsc#1054245).
- nvme: do not enable AEN if not supported (bsc#1077989).
- nvme: do not hold nvmf_transports_rwsem for more than transport lookups (bsc#1054245).
- nvme: do not rely on the changed namespace list log (bsc#1054245).
- nvme: enforce 64bit offset for nvme_get_log_ext fn (bsc#1054245).
- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD (,).
- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD ().
- nvme: fix use-after-free in nvme_free_ns_head (bsc#1054245).
- nvme: guard additional fields in nvme command structures (bsc#1054245).
- nvme: host: core: fix precedence of ternary operator (bsc#1054245).
- nvme: if_ready checks to fail io to deleting controller (bsc#1077989).
- nvme: implement log page low/high offset and dwords (bsc#1054245).
- nvme: kABI fix for ANA support in nvme_ctrl (bsc#1054245).
- nvme: kABI fixes for nvmet_ctrl (bsc#1054245).
- nvme: kabi fixes for nvme_ctrl (bsc#1054245).
- nvme: make nvme_get_log_ext non-static (bsc#1054245).
- nvme: mark nvme_queue_scan static (bsc#1054245).
- nvme: partially revert 'nvme: remove nvme_req_needs_failover' (bsc#1054245).
- nvme: reintruduce nvme_get_log_ext() (bsc#1054245).
- nvme: remove nvme_req_needs_failover (bsc#1054245).
- nvme: revert 'nvme: mark nvme_queue_scan static' (bsc#1054245).
- nvme: simplify the API for getting log pages (bsc#1054245).
- nvme: submit AEN event configuration on startup (bsc#1054245).
- nvme: use the changed namespaces list log to clear ns data changed AENs (bsc#1054245).
- nvmet-fc: fix target sgl list on large transfers ().
- nvmet-fc: fix target sgl list on large transfers (,).
- nvmet: add AEN configuration support (bsc#1054245).
- nvmet: add a new nvmet_zero_sgl helper (bsc#1054245).
- nvmet: add minimal ANA support (bsc#1054245).
- nvmet: constify struct nvmet_fabrics_ops (bsc#1054245).
- nvmet: filter newlines from user input (bsc#1054245).
- nvmet: fixup crash on NULL device path (bsc#1054245).
- nvmet: implement the changed namespaces log (bsc#1054245).
- nvmet: kABI fixes for ANA support (bsc#1054245).
- nvmet: keep a port pointer in nvmet_ctrl (bsc#1054245).
- nvmet: mask pending AENs (bsc#1054245).
- nvmet: reset keep alive timer in controller enable (bsc#1054245).
- nvmet: return all zeroed buffer when we can't find an active namespace (bsc#1054245).
- nvmet: revert 'nvmet: constify struct nvmet_fabrics_ops' (bsc#1054245).
- nvmet: split log page implementation (bsc#1054245).
- nvmet: support configuring ANA groups (bsc#1054245).
- nvmet: track and limit the number of namespaces per subsystem (1054245).
- nvmet: use Retain Async Event bit to clear AEN (bsc#1054245).
- of/pci: Fix theoretical NULL dereference (bsc#1051510).
- of: Make of_fwnode_handle() safer (bsc#1098633).
- of: fix DMA mask generation (bsc#1051510).
- of: restrict DMA configuration (bsc#1051510).
- pci: Account for all bridges on bus when distributing bus numbers (bsc#1100132).
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1051510).
- pci: dwc: Fix enumeration end when reaching root subordinate (bsc#1100132).
- pci: endpoint: Fix kernel panic after put_device() (bsc#1051510).
- pci: endpoint: Populate func_no before calling pci_epc_add_epf() (bsc#1051510).
- pci: exynos: Fix a potential init_clk_resources NULL pointer dereference (bsc#1051510).
- pci: faraday: Fix of_irq_get() error check (bsc#1051510).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1051510).
- pci: shpchp: Fix AMD POGO identification (bsc#1051510).
- perf intel-pt: Always set no branch for dummy event (bsc#1087217).
- perf intel-pt: Set no_aux_samples for the tracking event (bsc#1087217).
- perf/x86/intel/uncore: Add event constraint for BDX PCU (bsc#1087202).
- perf/x86/intel/uncore: Fix SKX CHA event extra regs (bsc#1087233).
- perf/x86/intel/uncore: Fix Skylake UPI pmU event masks (bsc#1087233).
- perf/x86/intel/uncore: Fix Skylake server CHA LLC_LOOKUP event umask (bsc#1087233).
- perf/x86/intel/uncore: Fix Skylake server PCU pmU event format (bsc#1087233).
- perf/x86/intel/uncore: Fix missing marker for skx_uncore_cha_extra_regs (bsc#1087233).
- perf/x86/intel/uncore: Remove invalid Skylake server CHA filter field (bsc#1087233).
- perf/x86: Fix data source decoding for Skylake ().
- perf/x86: Fix data source decoding for Skylake ().
- phy: add sgmii and 10gkr modes to the phy_mode enum (bsc#1098633).
- pinctrl: bcm2835: Avoid warning from __irq_do_set_handler (bsc#1051510).
- pinctrl: imx: fix debug message for SHARE_MUX_CONF_REG case (bsc#1051510).
- pinctrl: intel: Initialize GPIO properly when used through irqchip (bsc#1087092).
- pinctrl: intel: Read back TX buffer state (bsc#1051510).
- pinctrl: meson-gxbb: remove non-existing pin GPIOX_22 (bsc#1051510).
- pinctrl: meson-gxl: Fix typo in AO I2S pins (bsc#1051510).
- pinctrl: meson-gxl: Fix typo in AO SPDIF pins (bsc#1051510).
- pinctrl: mvebu: use correct MPP sel value for dev pins (bsc#1051510).
- pinctrl: nand: meson-gxbb: fix missing data pins (bsc#1051510).
- pinctrl: nsp: Fix potential NULL dereference (bsc#1051510).
- pinctrl: nsp: off by ones in nsp_pinmux_enable() (bsc#1100132).
- pinctrl: pinctrl-single: Fix pcs_request_gpio() when bits_per_mux != 0 (bsc#1051510).
- pinctrl: sh-pfc: r8a7790: Add missing TX_ER pin to avb_mii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7795: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510).
- pinctrl: sh-pfc: r8a7795: Fix to delete A20..A25 pins function definitions (bsc#1051510).
- pinctrl: sh-pfc: r8a7796: Fix IPSR and MOD_SEL register pin assignment for NDFC pins group (bsc#1051510).
- pinctrl: sh-pfc: r8a7796: Fix to delete A20..A25 pins function definitions (bsc#1051510).
- pinctrl: sh-pfc: r8a7796: Fix to delete FSCLKST pin and IPSR7 bit[15:12] register definitions (bsc#1051510).
- pinctrl: sunxi: fix V3s pinctrl driver IRQ bank base (bsc#1051510).
- pinctrl: sunxi: fix wrong irq_banks number for H5 pinctrl (bsc#1051510).
- pinctrl: uniphier: fix members of rmii group for Pro4 (bsc#1051510).
- pinctrl: uniphier: fix pin_config_get() for input-enable (bsc#1051510).
- pm/core: Fix supplier device runtime pm usage counter imbalance (bsc#1051510).
- pm/hibernate: Fix oops at snapshot_write() (bsc#1051510).
- pm/hibernate: Use CONFIG_HAVE_SET_MEMORY for include condition (bsc#1051510).
- pm/wakeup: Only update last time for active wakeup sources (bsc#1051510).
- power: gemini-poweroff: Avoid spurious poweroff (bsc#1051510).
- power: supply: act8945a_charger: fix of_irq_get() error check (bsc#1051510).
- power: supply: cpcap-charger: add OMAP_usb2 dependency (bsc#1051510).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).
- powerpc/64s: Clear PCR on boot (bnc#1012382).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).
- pwm: meson: Fix allocation of PWM channel array (bsc#1051510).
- pwm: meson: Improve PWM calculation precision (bsc#1051510).
- pwm: stm32: Enforce dependency on CONFIG_MFD_STM32_TIMERS (bsc#1051510).
- pwm: stm32: Remove unused struct device (bsc#1051510).
- pwm: tiehrpwm: Fix runtime pm imbalance at unbind (bsc#1051510).
- pwm: tiehrpwm: fix clock imbalance in probe error path (bsc#1051510).
- qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301).
- qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Advance drivers' version to 8.33.0.20 (bsc#1086314).
- qed*: Advance drivers' version to 8.33.0.20 (bsc#1086314).
- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301).
- qed*: use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add sanity check for SIMD fastpath handler (bsc#1050536).
- qed: Add sanity check for SIMD fastpath handler (bsc#1050536).
- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536).
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536).
- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536).
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536).
- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536).
- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536).
- qed: Fix mask for physical address in ILT entry (networking-stable-18_06_08).
- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix possible memory leak in Rx error path handling (bsc#1050536).
- qed: Fix possible memory leak in Rx error path handling (bsc#1050536).
- qed: Fix possible race for the link state value (bsc#1050536).
- qed: Fix possible race for the link state value (bsc#1050536).
- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading stale configuration information (bsc#1086314).
- qed: Fix reading stale configuration information (bsc#1086314).
- qed: Fix setting of incorrect eswitch mode (bsc#1050536).
- qed: Fix setting of incorrect eswitch mode (bsc#1050536).
- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix use of incorrect size in memcpy call (bsc#1050536).
- qed: Fix use of incorrect size in memcpy call (bsc#1050536).
- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536).
- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Remove unused data member 'is_mf_default' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Remove unused data member 'is_mf_default' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: fix spelling mistake: 'checksumed' -> 'checksummed' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: fix spelling mistake: 'checksumed' -> 'checksummed' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: fix spelling mistake: 'offloded' -> 'offloaded' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: fix spelling mistake: 'offloded' -> 'offloaded' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: fix spelling mistake: 'taskelt' -> 'tasklet' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: fix spelling mistake: 'taskelt' -> 'tasklet' (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538).
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538).
- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086314 bsc#1086313 bsc#1086301).
- qede: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086314 bsc#1086313 bsc#1086301).
- qedr: Fix spelling mistake: 'hanlde' -> 'handle' (bsc#1086314 bsc#1086313 bsc#1086301).
- qedr: Fix spelling mistake: 'hanlde' -> 'handle' (bsc#1086314 bsc#1086313 bsc#1086301).
- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301).
- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301).
- qlogic: check kstrtoul() for errors (bsc#1050540).
- qlogic: check kstrtoul() for errors (bsc#1050540).
- qmi_wwan: add support for Quectel EG91 (bsc#1051510).
- qmi_wwan: add support for the Dell Wireless 5821e module (bsc#1051510).
- qmi_wwan: fix interface number for DW5821e production firmware (bsc#1051510).
- qmi_wwan: set FLAG_SEND_ZLP to avoid network initiated disconnect (bsc#1051510).
- r8152: fix tx packets accounting (bsc#1051510).
- r8152: napi hangup fix after disconnect (bsc#1051510).
- r8169: Be drop monitor friendly (bsc#1051510).
- rbd: flush rbd_dev->watch_dwork after watch is unregistered (bsc#1103216).
- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306).
- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306).
- rdma/cma: Fix use after destroy access to net namespace for IPoib (bsc#1046306).
- rdma/cma: Fix use after destroy access to net namespace for IPoib (bsc#1046306).
- rdma/cxgb4: Use structs to describe the uABI instead of opencoding (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- rdma/cxgb4: release hw resources on device removal (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659).
- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659).
- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659).
- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659).
- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307).
- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307).
- rdma/iwpm: fix memory leak on map_info (bsc#1046306).
- rdma/iwpm: fix memory leak on map_info (bsc#1046306).
- rdma/mlx4: Discard unknown SQP work requests (bsc#1046302).
- rdma/mlx4: Discard unknown SQP work requests (bsc#1046302).
- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305).
- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305).
- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305).
- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305).
- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305).
- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305).
- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305).
- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305).
- rdma/mlx5: Protect from shift operand overflow (bsc#1046305).
- rdma/mlx5: Protect from shift operand overflow (bsc#1046305).
- rdma/mlx5: Use proper spec flow label type (bsc#1046305).
- rdma/mlx5: Use proper spec flow label type (bsc#1046305).
- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301).
- rdma/ucma: Do not allow setting rdma_OPTION_ib_PATH without an rdma device (bsc#1046306).
- rdma/ucma: Do not allow setting rdma_OPTION_ib_PATH without an rdma device (bsc#1046306).
- rdma/ucma: ucma_context reference leak in error path (bsc#1046306).
- rdma/ucma: ucma_context reference leak in error path (bsc#1046306).
- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306).
- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306).
- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306).
- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306).
- regulator: max8998: Fix platform data retrieval (bsc#1051510).
- regulator: qcom_spmi: Include offset when translating voltages (bsc#1051510).
- regulator: tps65218: Fix strobe assignment (bsc#1051510).
- rpm/kernel-source.spec.in: Add more stuff to Recommends ... and move bc to Recommends as well. All these packages are needed for building a kernel manually from scratch with kernel-source files.
- rpm/kernel-source.spec.in: require bc for kernel-source This is needed for building include/generated/timeconst.h from kernel/time/timeconst.bc.
- rtc: ac100: Fix ac100 determine rate bug (bsc#1051510).
- rtc: pxa: fix probe function (bsc#1051510).
- rtlwifi: Fix kernel Oops 'Fw download fail!!' (bsc#1051510).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bsc#1051510).
- rtnetlink: validate attributes in do_setlink() (networking-stable-18_06_08).
- s390/crc32-vx: use expoline for indirect branches (git-fixes f19fbd5ed6).
- s390/ftrace: use expoline for indirect branches (git-fixes f19fbd5ed6).
- s390/gs: add compat regset for the guarded storage broadcast control block (git-fixes e525f8a6e696).
- s390/kernel: use expoline for indirect branches (git-fixes f19fbd5ed6).
- s390/lib: use expoline for indirect branches (git-fixes f19fbd5ed6).
- s390/qdio: do not retry EQBS after CCQ 96 (bsc#1102088, LTC#169699).
- s390/qeth: fix error handling in adapter command callbacks (bsc#1102088, LTC#169699).
- s390/qeth: fix race when setting MAC address (bnc#1093148, LTC#167307).
- s390: Correct register corruption in critical section cleanup (git-fixes 6dd85fbb87).
- s390: add assembler macros for CPU alternatives (git-fixes f19fbd5ed6).
- s390: correct module section names for expoline code revert (git-fixes f19fbd5ed6).
- s390: extend expoline to BC instructions (git-fixes, bsc#1103421).
- s390: move expoline assembler macros to a header (git-fixes f19fbd5ed6).
- s390: move spectre sysfs attribute code (bsc#1090098).
- s390: optimize memset implementation (git-fixes f19fbd5ed6).
- s390: remove indirect branch from do_softirq_own_stack (git-fixes f19fbd5ed6).
- s390: use expoline thunks in the BPF JIT (git-fixes, bsc#1103421).
- sched/core: Optimize ttwu_stat() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/core: Optimize update_stats_*() (bnc#1101669 optimise numa balancing for fast migrate).
- scripts/dtc: fix '%zx' warning (bsc#1051510).
- scripts/gdb/linux/tasks.py: fix get_thread_info (bsc#1051510).
- scripts/git_sort/git_sort.py: Add 'nvme-4.18' to the list of repositories
- scripts/git_sort/git_sort.py: add modules-next tree
- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bsc#1051510).
- scsi: aacraid: Correct hba_send to include iu_type (bsc#1077989).
- scsi: core: clean up generated file scsi_devinfo_tbl.c (bsc#1077989).
- scsi: cxgb4i: silence overflow warning in t4_uld_rx_handler() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- scsi: megaraid_sas: Do not log an error if FW successfully initializes (bsc#1077989).
- scsi: qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1077989).
- scsi: qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1077338).
- scsi: zfcp: fix infinite iteration on ERP ready list (bsc#1102088, LTC#169699).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bsc#1102088, LTC#169699).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bsc#1102088, LTC#169699).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bsc#1102088, LTC#169699).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bsc#1102088, LTC#169699).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bsc#1102088, LTC#169699).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bsc#1102088, LTC#169699).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bsc#1102088, LTC#169699).
- sctp: not allow transport timeout value less than HZ/5 for hb_timer (networking-stable-18_06_08).
- serial: earlycon: Only try fdt when specify 'earlycon' exactly (bsc#1051510).
- serial: imx: drop if that always evaluates to true (bsc#1051510).
- serial: pxa: Fix out-of-bounds access through serial port index (bsc#1051510).
- serial: sh-sci: Update warning message in sci_request_dma_chan() (bsc#1051510).
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bsc#1051510).
- serial: sirf: Fix out-of-bounds access through DT alias (bsc#1051510).
- sfc: stop the TX queue before pushing new buffers (bsc#1058169).
- sfc: stop the TX queue before pushing new buffers (bsc#1058169).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1051510).
- smsc75xx: fix smsc75xx_set_features() (bsc#1051510).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1051510).
- socket: close race condition between sock_close() and sockfs_setattr() (networking-stable-18_06_20).
- spi: bcm-qspi: fIX some error handling paths (bsc#1051510).
- spi: core: Fix devm_spi_register_master() function name in kerneldoc (bsc#1051510).
- spi: pxa2xx: Do not touch CS pin until we have a transfer pending (bsc#1051510).
- spi: sh-msiof: Fix bit field overflow writes to TSCR/RSCR (bsc#1051510).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bsc#1051510).
- staging: fbtft: array underflow in fbtft_request_gpios_match() (bsc#1051510).
- staging: iio: ade7759: fix signed extension bug on shift of a u8 (bsc#1051510).
- staging: rtl8723bs: Prevent an underflow in rtw_check_beacon_data() (bsc#1051510).
- staging: rtl8723bs: add missing range check on id (bsc#1051510).
- staging: rtl8723bs: fix u8 less than zero check (bsc#1051510).
- staging: rts5208: Fix 'seg_no' calculation in reset_ms_card() (bsc#1051510).
- staging: sm750fb: Fix parameter mistake in poke32 (bsc#1051510).
- staging:iio:ade7854: Fix error handling on read/write (bsc#1051510).
- staging:iio:ade7854: Fix the wrong number of bits to read (bsc#1051510).
- tcp: verify the checksum of the first data segment in a new connection (networking-stable-18_06_20).
- team: use netdev_features_t instead of u32 (networking-stable-18_06_08).
- thermal/drivers/hisi: Fix kernel panic on alarm interrupt (bsc#1051510).
- thermal/drivers/hisi: Fix missing interrupt enablement (bsc#1051510).
- thermal/drivers/hisi: Fix multiple alarm interrupts firing (bsc#1051510).
- thermal/drivers/hisi: Simplify the temperature/step computation (bsc#1051510).
- thermal: bcm2835: fix an error code in probe() (bsc#1051510).
- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bsc#1051510).
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bsc#1051510).
- timekeeping: Use proper timekeeper for debug code (bsc#1051510).
- tools lib traceevent: Fix get_field_str() for dynamic strings (bsc#1051510).
- tools lib traceevent: Simplify pointer print logic and fix %pF (bsc#1051510).
- tools/lib/lockdep: Define the ARRAY_SIZE() macro (bsc#1051510).
- tools/lib/lockdep: Fix undefined symbol prandom_u32 (bsc#1051510).
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bsc#1051510).
- tools/power turbostat: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1051510).
- tools/thermal: tmon: fix for segfault (bsc#1051510).
- tools/usbip: fixes build with musl libc toolchain (bsc#1051510).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bsc#1051510).
- ubifs: Fix data node size for truncating uncompressed nodes (bsc#1051510).
- ubifs: Fix potential integer overflow in allocation (bsc#1051510).
- ubifs: Fix uninitialized variable in search_dh_cookie() (bsc#1051510).
- ubifs: Fix unlink code wrt. double hash lookups (bsc#1051510).
- udp: fix rx queue len reported by diag and proc interface (networking-stable-18_06_20).
- usb-storage: Add compatibility quirk flags for G-Technologies G-Drive (bsc#1051510).
- usb-storage: Add support for FL_ALWAYS_SYNC flag in the UAS driver (bsc#1051510).
- usb/gadget: Fix 'high bandwidth' check in usb_gadget_ep_match_desc() (bsc#1051510).
- usb: Increment wakeup count on remote wakeup (bsc#1051510).
- usb: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bsc#1087092).
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1051510).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bsc#1051510).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bsc#1051510).
- usb: cdc_acm: prevent race at write to acm while system resumes (bsc#1087092).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1051510).
- usb: do not reset if a low-speed or full-speed device timed out (bsc#1051510).
- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1051510).
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bsc#1051510).
- usb: dwc2: Improve gadget state disconnection handling (bsc#1085539).
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1051510).
- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1051510).
- usb: dwc2: hcd: Fix host channel halt flow (bsc#1051510).
- usb: dwc2: host: Fix transaction errors in host mode (bsc#1051510).
- usb: dwc3: Add SoftReset PHY synchonization delay (bsc#1051510).
- usb: dwc3: Fix GDBGFIFOSPACE_TYPE values (bsc#1051510).
- usb: dwc3: Makefile: fix link error on randconfig (bsc#1051510).
- usb: dwc3: Undo PHY init if soft reset fails (bsc#1051510).
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bsc#1051510).
- usb: dwc3: ep0: Reset TRB counter for ep0 IN (bsc#1051510).
- usb: dwc3: gadget: Fix list_del corruption in dwc3_ep_dequeue (bsc#1051510).
- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bsc#1051510).
- usb: dwc3: of-simple: fix use-after-free on remove (bsc#1051510).
- usb: dwc3: omap: do not miss events during suspend/resume (bsc#1051510).
- usb: dwc3: pci: Properly cleanup resource (bsc#1051510).
- usb: dwc3: prevent setting PRTCAP to OTG from debugfs (bsc#1051510).
- usb: gadget: bdc: 64-bit pointer capability check (bsc#1051510).
- usb: gadget: composite: fix incorrect handling of OS desc requests (bsc#1051510).
- usb: gadget: core: Fix use-after-free of usb_request (bsc#1051510).
- usb: gadget: dummy: fix nonsensical comparisons (bsc#1051510).
- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bsc#1051510).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bsc#1051510).
- usb: gadget: f_fs: Process all descriptors during bind (bsc#1051510).
- usb: gadget: f_fs: Use config_ep_by_speed() (bsc#1051510).
- usb: gadget: f_mass_storage: Fix the logic to iterate all common->luns (bsc#1051510).
- usb: gadget: f_midi: fixing a possible double-free in f_midi (bsc#1051510).
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bsc#1051510).
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bsc#1051510).
- usb: gadget: f_uac2: fix error handling in afunc_bind (again) (bsc#1051510).
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bsc#1051510).
- usb: gadget: ffs: Let setup() return usb_GADGET_DELAYED_STATUS (bsc#1051510).
- usb: gadget: fsl_udc_core: fix ep valid checks (bsc#1051510).
- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bsc#1051510).
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bsc#1051510).
- usb: gadget: udc: core: update usb_ep_queue() documentation (bsc#1051510).
- usb: gadget: udc: renesas_usb3: disable the controller's irqs for reconnecting (bsc#1051510).
- usb: host: ehci: use correct device pointer for dma ops (bsc#1087092).
- usb: host: xhci-plat: revert 'usb: host: xhci-plat: enable clk in resume timing' (bsc#1051510).
- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bsc#1051510).
- usb: musb: Fix external abort in musb_remove on omap2430 (bsc#1051510).
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bsc#1051510).
- usb: musb: fix enumeration after resume (bsc#1051510).
- usb: musb: fix remote wakeup racing with suspend (bsc#1051510).
- usb: musb: gadget: misplaced out of bounds check (bsc#1051510).
- usb: musb: host: fix potential NULL pointer dereference (bsc#1051510).
- usb: musb: trace: fix NULL pointer dereference in musb_g_tx() (bsc#1051510).
- usb: option: Add support for FS040U modem (bsc#1087092).
- usb: quirks: add delay quirks for Corsair Strafe (bsc#1051510).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1051510).
- usb: serial: cp210x: add CESINEL device ids (bsc#1051510).
- usb: serial: cp210x: add ELDAT Easywave RX09 id (bsc#1051510).
- usb: serial: cp210x: add ID for NI usb serial console (bsc#1051510).
- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bsc#1051510).
- usb: serial: cp210x: add another usb ID for Qivicon ZigBee stick (bsc#1051510).
- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bsc#1051510).
- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bsc#1051510).
- usb: serial: ftdi_sio: use jtag quirk for Arrow usb Blaster (bsc#1051510).
- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).
- usb: serial: mos7840: fix status-register error handling (bsc#1051510).
- usb: serial: option: Add support for Quectel EP06 (bsc#1051510).
- usb: serial: option: adding support for ublox R410M (bsc#1051510).
- usb: serial: option: reimplement interface masking (bsc#1051510).
- usb: serial: simple: add libtransistor console (bsc#1051510).
- usb: serial: visor: handle potential invalid device configuration (bsc#1051510).
- usb: yurex: fix out-of-bounds uaccess in read handler (bsc#1100132).
- usbip: Correct maximum value of CONFIG_usbIP_VHCI_HC_PORTS (bsc#1051510).
- usbip: usbip_event: fix to not print kernel pointer address (bsc#1051510).
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bsc#1051510).
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bsc#1051510).
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1051510).
- vfio/pci: Fix potential Spectre v1 (bsc#1051510).
- vfio/spapr: Use IOMMU pageshift rather than pagesize (bsc#1077761, git-fixes).
- vhost: synchronize IOTLB message with dev cleanup (networking-stable-18_06_08).
- video/omap: add module license tags (bsc#1090888).
- video: remove unused kconfig SH_LCD_MIPI_DSI (bsc#1087092).
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bsc#1051510).
- virtio-net: correctly transmit XDP buff after linearizing (networking-stable-18_06_08).
- virtio-net: fix leaking page for gso packet during mergeable XDP (networking-stable-18_06_08).
- virtio-net: fix module unloading (bsc#1051510).
- virtio_net: Disable interrupts if napi_complete_done rescheduled napi (bsc#1051510).
- virtio_net: fix XDP code path in receive_small() (bsc#1051510).
- vmcore: add API to collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- vrf: check the original netdevice for generating redirect (networking-stable-18_06_08).
- wlcore: add missing nvs file name info for wilink8 (bsc#1051510).
- x.509: unpack RSA signatureValue field from BIT STRING (bsc#1051510).
- x86/efi: Access EFI MMIO data as unencrypted when SEV is active (bsc#1099193).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xhci: Fix kernel oops in trace_xhci_free_virt_device (bsc#1100132).
- xhci: Fix usb3 NULL pointer dereference at logical disconnect (bsc#1090888).
- xhci: Fix use-after-free in xhci_free_virt_device (bsc#1100132).
- xhci: revert 'xhci: plat: Register shutdown for xhci_plat' (bsc#1090888).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1504,SUSE-SLE-Module-Development-Tools-15-2018-1504,SUSE-SLE-Module-Legacy-15-2018-1504,SUSE-SLE-Module-Live-Patching-15-2018-1504,SUSE-SLE-Product-HA-15-2018-1504,SUSE-SLE-Product-WE-15-2018-1504
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\nCVE-2018-5390 aka SegmentSmack:\n A remote attacker even with relatively low bandwidth could have caused lots of CPU usage\n by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)\nCVE-2017-18344:\n The timer_create syscall implementation didn\u0027t properly validate input, which could have lead to out-of-bounds access.\n This allowed userspace applications to read arbitrary kernel memory in some setups. (bsc#1102851)\n\nThe following non-security bugs were fixed:\n\n- acpi, apei, einj: Subtract any matching Register Region from Trigger resources (bsc#1051510).\n- acpi, nfit: Fix scrub idle detection (bsc#1094119).\n- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1051510).\n- acpi/processor: Finish making acpi_processor_ppc_has_changed() void (bsc#1051510).\n- ahci: Disable Lpm on Lenovo 50 series laptops with a too old BIOS (bsc#1051510).\n- alsa: hda - Handle pm failure during hotplug (bsc#1051510).\n- alsa: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk (bsc#1051510).\n- alsa: hda/realtek - Yet another Clevo P950 quirk entry (bsc#1101143).\n- alsa: hda/realtek - two more lenovo models need fixup of MIC_LOCATION (bsc#1051510).\n- alsa: hda: add mute led support for HP ProBook 455 G5 (bsc#1051510).\n- alsa: rawmidi: Change resized buffers atomically (bsc#1051510).\n- alx: take rtnl before calling __alx_open from resume (bsc#1051510).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1103220).\n- arm: module: fix modsign build error (bsc#1093666).\n- asoc: mediatek: preallocate pages use platform device (bsc#1051510).\n- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1051510).\n- atl1c: reserve min skb headroom (bsc#1051510).\n- audit: Fix wrong task in comparison of session ID (bsc#1051510).\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bsc#1051510).\n- audit: return on memory error to avoid null pointer dereference (bsc#1051510).\n- b44: Initialize 64-bit stats seqcount (bsc#1051510).\n- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1051510).\n- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1051510).\n- batman-adv: Accept only filled wifi station info (bsc#1051510).\n- batman-adv: Always initialize fragment header priority (bsc#1051510).\n- batman-adv: Avoid race in TT TVLV allocator helper (bsc#1051510).\n- batman-adv: Avoid storing non-TT-sync flags on singular entries too (bsc#1051510).\n- batman-adv: Fix TT sync flags for intermediate TT responses (bsc#1051510).\n- batman-adv: Fix bat_ogm_iv best gw refcnt after netlink dump (bsc#1051510).\n- batman-adv: Fix bat_v best gw refcnt after netlink dump (bsc#1051510).\n- batman-adv: Fix check of retrieved orig_gw in batadv_v_gw_is_eligible (bsc#1051510).\n- batman-adv: Fix debugfs path for renamed hardif (bsc#1051510).\n- batman-adv: Fix debugfs path for renamed softif (bsc#1051510).\n- batman-adv: Fix internal interface indices types (bsc#1051510).\n- batman-adv: Fix lock for ogm cnt access in batadv_iv_ogm_calc_tq (bsc#1051510).\n- batman-adv: Fix multicast packet loss with a single WANT_ALL_IPV4/6 flag (bsc#1051510).\n- batman-adv: Fix netlink dumping of BLA backbones (bsc#1051510).\n- batman-adv: Fix netlink dumping of BLA claims (bsc#1051510).\n- batman-adv: Fix skbuff rcsum on packet reroute (bsc#1051510).\n- batman-adv: Ignore invalid batadv_iv_gw during netlink send (bsc#1051510).\n- batman-adv: Ignore invalid batadv_v_gw during netlink send (bsc#1051510).\n- batman-adv: Use default throughput value on cfg80211 error (bsc#1051510).\n- batman-adv: fix TT sync flag inconsistencies (bsc#1051510).\n- batman-adv: fix header size check in batadv_dbg_arp() (bsc#1051510).\n- batman-adv: fix multicast-via-unicast transmission with AP isolation (bsc#1051510).\n- batman-adv: fix packet checksum in receive path (bsc#1051510).\n- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bsc#1051510).\n- batman-adv: invalidate checksum on fragment reassembly (bsc#1051510).\n- batman-adv: update data pointers after skb_cow() (bsc#1051510).\n- blk-mq: count allocated but not started requests in iostats inflight (bsc#1077989).\n- blk-mq: fix sysfs inflight counter (bsc#1077989).\n- block: always set partition number to \u00270\u0027 in blk_partition_remap() (bsc#1054245).\n- block: always set partition number to \u00270\u0027 in blk_partition_remap() (bsc#1077989).\n- block: bio_check_eod() needs to consider partitions (bsc#1077989).\n- block: fail op_is_write() requests to read-only partitions (bsc#1077989).\n- block: pass \u0027run_queue\u0027 to blk_mq_request_bypass_insert (bsc#1077989).\n- block: set request_list for request (bsc#1077989).\n- bluetooth: avoid recursive locking in hci_send_to_channel() (bsc#1051510).\n- bluetooth: hci_ll: Add support for the external clock (bsc#1051510).\n- bluetooth: hci_ll: Fix download_firmware() return when __hci_cmd_sync fails (bsc#1051510).\n- bluetooth: hci_nokia: select BT_HCIUART_H4 (bsc#1051510).\n- bluetooth: hci_uart: fix kconfig dependency (bsc#1051510).\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242).\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242).\n- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242).\n- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242).\n- bnxt_en: Fix for system hang if request_irq fails (bsc#1050242).\n- bnxt_en: Fix for system hang if request_irq fails (bsc#1050242).\n- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242).\n- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242).\n- bnxt_en: Fix the vlan_tci exact match check (bsc#1050242).\n- bnxt_en: Fix the vlan_tci exact match check (bsc#1050242).\n- bonding: re-evaluate force_primary when the primary slave name changes (networking-stable-18_06_20).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- bus: arm-cci: Fix use of smp_processor_id() in preemptible context (bsc#1051510).\n- bus: arm-ccn: Check memory allocation failure (bsc#1051510).\n- bus: arm-ccn: Fix use of smp_processor_id() in preemptible context (bsc#1051510).\n- bus: arm-ccn: fix module unloading Error: Removing state 147 which has instances left (bsc#1051510).\n- can: bcm: check for null sk before deferencing it via the call to sock_net (bsc#1051510).\n- can: m_can.c: fix setup of CCCR register: clear CCCR NISO bit before checking can.ctrlmode (bsc#1051510).\n- can: mpc5xxx_can: check of_iomap return before use (bsc#1051510).\n- can: peak_canfd: fix firmware v3.3.0: limit allocation to 32-bit DMA addr only (bsc#1051510).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bsc#1051510).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bsc#1051510).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bsc#1051510).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bsc#1051510).\n- can: xilinx_can: fix power management handling (bsc#1051510).\n- can: xilinx_can: fix recovery from error states not being propagated (bsc#1051510).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bsc#1051510).\n- cdc_ncm: avoid padding beyond end of skb (networking-stable-18_06_20).\n- cfg80211: initialize sinfo in cfg80211_get_station (bsc#1051510).\n- checkpatch: add 6 missing types to --list-types (bsc#1051510).\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097).\n- clk: Do not show the incorrect clock phase (bsc#1051510).\n- clk: Do not write error code into divider register (bsc#1051510).\n- clk: Fix __set_clk_rates error print-string (bsc#1051510).\n- clk: at91: PLL recalc_rate() now using cached MUL and DIV values (bsc#1051510).\n- clk: at91: fix clk-generated parenting (bsc#1051510).\n- clk: axi-clkgen: Correctly handle nocount bit in recalc_rate() (bsc#1051510).\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bsc#1051510).\n- clk: fix false-positive Wmaybe-uninitialized warning (bsc#1051510).\n- clk: fix mux clock documentation (bsc#1051510).\n- clk: fix set_rate_range when current rate is out of range (bsc#1051510).\n- clk: hi3660: fix incorrect uart3 clock freqency (bsc#1051510).\n- clk: hi6220: change watchdog clock source (bsc#1051510).\n- clk: hi6220: mark clock cs_atb_syspll as critical (bsc#1051510).\n- clk: hisilicon: fix potential NULL dereference in hisi_clk_alloc() (bsc#1051510).\n- clk: hisilicon: mark wdt_mux_p[] as const (bsc#1051510).\n- clk: honor CLK_MUX_ROUND_CLOSEST in generic clk mux (bsc#1051510).\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bsc#1051510).\n- clk: imx7d: fix mipi dphy div parent (bsc#1051510).\n- clk: mediatek: add the option for determining PLL source clock (bsc#1051510).\n- clk: mediatek: mark mtk_infrasys_init_early __init (bsc#1051510).\n- clk: meson: gxbb: fix clk_mclk_i958 divider flags (bsc#1051510).\n- clk: meson: gxbb: fix meson cts_amclk divider flags (bsc#1051510).\n- clk: meson: gxbb: fix wrong clock for SARADC/SANA (bsc#1051510).\n- clk: meson: meson8b: fix protection against undefined clks (bsc#1051510).\n- clk: meson: mpll: fix mpll0 fractional part ignored (bsc#1051510).\n- clk: meson: mpll: use 64-bit maths in params_from_rate (bsc#1051510).\n- clk: meson: remove unnecessary rounding in the pll clock (bsc#1051510).\n- clk: mvebu: use correct bit for 98DX3236 NAND (bsc#1051510).\n- clk: qcom: Base rcg parent rate off plan frequency (bsc#1051510).\n- clk: qcom: clk-smd-rpm: Fix the reported rate of branches (bsc#1051510).\n- clk: qcom: common: fix legacy board-clock registration (bsc#1051510).\n- clk: qcom: msm8916: Fix bimc gpu clock ops (bsc#1051510).\n- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bsc#1051510).\n- clk: renesas: div6: Document fields used for parent selection (bsc#1051510).\n- clk: renesas: r8a7745: Remove PLL configs for MD19=0 (bsc#1051510).\n- clk: renesas: r8a7745: Remove nonexisting scu-src[0789] clocks (bsc#1051510).\n- clk: renesas: r8a7795: Correct pwm, gpio, and i2c parent clocks on ES2.0 (bsc#1051510).\n- clk: renesas: rcar-gen2: Fix PLL0 on R-Car V2H and E2 (bsc#1051510).\n- clk: rockchip: Fix wrong parent for SDMMC phase clock for rk3228 (bsc#1051510).\n- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bsc#1051510).\n- clk: samsung: Fix m2m scaler clock on Exynos542x (bsc#1051510).\n- clk: samsung: exynos3250: Fix PLL rates (bsc#1051510).\n- clk: samsung: exynos5250: Add missing clocks for FIMC LITE SYSMMU devices (bsc#1051510).\n- clk: samsung: exynos5250: Fix PLL rates (bsc#1051510).\n- clk: samsung: exynos5260: Fix PLL rates (bsc#1051510).\n- clk: samsung: exynos5433: Fix PLL rates (bsc#1051510).\n- clk: samsung: exynos7: Fix PLL rates (bsc#1051510).\n- clk: samsung: s3c2410: Fix PLL rates (bsc#1051510).\n- clk: scpi: error when clock fails to register (bsc#1051510).\n- clk: scpi: fix return type of __scpi_dvfs_round_rate (bsc#1051510).\n- clk: si5351: Rename internal plls to avoid name collisions (bsc#1051510).\n- clk: si5351: fix PLL reset (bsc#1051510).\n- clk: socfpga: Fix the smplsel on Arria10 and Stratix10 (bsc#1051510).\n- clk: sunxi-ng: Fix fractional mode for N-M clocks (bsc#1051510).\n- clk: sunxi-ng: Make fractional helper less chatty (bsc#1051510).\n- clk: sunxi-ng: Wait for lock when using fractional mode (bsc#1051510).\n- clk: sunxi-ng: a31: Fix CLK_OUT_* clock ops (bsc#1051510).\n- clk: sunxi-ng: add CLK_SET_RATE_PARENT flag to H3 GPU clock (bsc#1051510).\n- clk: sunxi-ng: add CLK_SET_RATE_UNGATE to all H3 PLLs (bsc#1051510).\n- clk: sunxi-ng: allow set parent clock (PLL_CPUX) for CPUX clock on H3 (bsc#1051510).\n- clk: sunxi-ng: h3: gate then ungate PLL CPU clk after rate change (bsc#1051510).\n- clk: sunxi-ng: multiplier: Fix fractional mode (bsc#1051510).\n- clk: sunxi-ng: nm: Check if requested rate is supported by fractional clock (bsc#1051510).\n- clk: sunxi-ng: sun5i: Fix bit offset of audio PLL post-divider (bsc#1051510).\n- clk: sunxi-ng: sun6i: Export video PLLs (bsc#1051510).\n- clk: sunxi-ng: sun6i: Rename HDMI DDC clock to avoid name collision (bsc#1051510).\n- clk: sunxi: fix build warning (bsc#1051510).\n- clk: sunxi: fix uninitialized access (bsc#1051510).\n- clk: tegra: Fix cclk_lp divisor register (bsc#1051510).\n- clk: tegra: Fix pll_u rate configuration (bsc#1051510).\n- clk: tegra: Use readl_relaxed_poll_timeout_atomic() in tegra210_clock_init() (bsc#1051510).\n- clk: ti: dra7-atl-clock: fix child-node lookups (bsc#1051510).\n- clk: uniphier: fix DAPLL2 clock rate of Pro5 (bsc#1051510).\n- clk: x86: Do not gate clocks enabled by the firmware (bsc#1051510).\n- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bsc#1051510).\n- clocksource/drivers/stm32: Fix kernel panic with multiple timers (bsc#1051510).\n- cnic: Fix an error handling path in \u0027cnic_alloc_bnx2x_resc()\u0027 (bsc#1086324).\n- cnic: Fix an error handling path in \u0027cnic_alloc_bnx2x_resc()\u0027 (bsc#1086324).\n- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bsc#1100884).\n- cpufreq: Fix new policy initialization during limits updates via sysfs (bsc#1100884).\n- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bsc#1100884).\n- cpufreq: docs: Add missing cpuinfo_cur_freq description (bsc#1051510).\n- cpufreq: docs: Drop intel-pstate.txt from index.txt (bsc#1051510).\n- cpufreq: governors: Fix long idle detection logic in load calculation (bsc#1100884).\n- cpufreq: powernv: Fix hardlockup due to synchronous smp_call in timer interrupt (bsc#1100884).\n- cpuidle: powernv: Fix promotion from snooze if next state disabled (bsc#1100884).\n- crash_dump: is_kdump_kernel can be boolean (bsc#1103230).\n- crypto: caam/qi - explicitly set dma_ops (bsc#1051510).\n- crypto: ccp - remove unused variable qim (bsc#1051510).\n- crypto: change transient busy return code to -ENOSPC (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Add authenc versions of ctr and sha (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Check error code with IS_ERR macro (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Fix IV updated in XTS operation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Fix Indentation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Fix an error code in chcr_hash_dma_map() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Fix indentation warning (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Fix iv passed in fallback path for rfc3686 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Fix src buffer dma length (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Make function aead_ccm_validate_input static (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Remove allocation of sg list to implement 2K limit of dsgl header (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Remove dst sg size zero check (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Remove unused parameter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Update IV before sending request to HW (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Use kernel round function to align lengths (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - Use x8_ble gf multiplication to calculate IV (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - check for sg null (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: chelsio - do not leak pointers to authenc keys (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bsc#1051510).\n- crypto: crypto4xx - remove bad list_del (bsc#1051510).\n- crypto: gf128mul - The x8_ble multiplication functions (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- crypto: sha512-mb - add some missing unlock on error (bsc#1051510).\n- cxgb4/cxgb4vf: Notify link changes to OS-dependent code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4/cxgb4vf: add support for ndo_set_vf_vlan (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4/cxgb4vf: check fw caps to set link mode mask (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4/cxgb4vf: link management changes for new SFP (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add FORCE_PAUSE bit to 32 bit port caps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add HMA support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add TP Congestion map entry for single-port (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add new T5 device id (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add new T6 device ids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add support for ethtool i2c dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add support to initialise/read SRQ entries (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Add support to query HW SRQ parameters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Adds CPL support for Shared Receive Queues (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Check alignment constraint for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Check for kvzalloc allocation failure (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Fix error handling path in \u0027init_one()\u0027 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Fix queue free path of ULD drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Fix {vxlan/geneve}_port initialization (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: IPv6 filter takes 2 tids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Setup FW queues before registering netdev (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Support firmware rdma write completion work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: Support firmware rdma write with immediate work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: add new T5 device id\u0027s (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: avoid schedule while atomic (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: change the port capability bits definition (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: clean up init_one (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: collect SGE PF/VF queue map (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: copy adap index to PF0-3 adapter instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: copy mbox log size to PF0-3 adap instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: copy the length of cpl_tx_pkt_core to fw_wr (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: copy vlan_id in ndo_get_vf_config (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: depend on firmware event for link status (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do L1 config when module is inserted (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not display 50Gbps as unsupported speed (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not fail vf instatiation in slave mode (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not set needs_free_netdev for mgmt dev\u0027s (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: enable ZLib_DEFLATE when building cxgb4 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: enable inner header checksum calculation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: fix the wrong conversion of Mbps to Kbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: free up resources of pf 0-3 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: increase max tx rate limit to 100 Gbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: notify fatal error to uld drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: remove dead code when allocating filter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: restructure VF mgmt code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: rework on-chip memory read (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: support new ISSI flash parts (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: update LE-TCAM collection for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: update dump collection logic to use compression (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: use CLIP with LIP6 on T6 for TCAM filters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: use zlib deflate to compress firmware dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: zero the HMA memory (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4vf: Forcefully link up virtual interfaces (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4vf: display pause settings (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgbit: call neigh_event_send() to update MAC address (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (networking-stable-18_06_08).\n- device property: Allow iterating over available child fwnodes (bsc#1098633).\n- device property: Introduce fwnode_call_bool_op() for ops that return bool (bsc#1098633).\n- device property: Introduce fwnode_device_is_available() (bsc#1098633).\n- device property: Introduce fwnode_get_mac_address() (bsc#1098633).\n- device property: Introduce fwnode_get_phy_mode() (bsc#1098633).\n- device property: Introduce fwnode_irq_get() (bsc#1098633).\n- device property: Move FW type specific functionality to FW specific files (bsc#1098633).\n- device property: Move fwnode graph ops to firmware specific locations (bsc#1098633).\n- device property: preserve usecount for node passed to of_fwnode_graph_get_port_parent() (bsc#1098633).\n- dmaengine: fsl-edma: disable clks on all error paths (bsc#1051510).\n- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bsc#1051510).\n- dmaengine: mv_xor_v2: Fix clock resource by adding a register clock (bsc#1051510).\n- dmaengine: omap-dma: port_window support correction for both direction (bsc#1051510).\n- dmaengine: pl330: fix a race condition in case of threaded irqs (bsc#1051510).\n- dmaengine: pl330: report BURST residue granularity (bsc#1051510).\n- dmaengine: qcom: bam_dma: get num-channels and num-ees from dt (bsc#1051510).\n- dmaengine: qcom_hidma: check pending interrupts (bsc#1051510).\n- dmaengine: rcar-dmac: Check the done lists in rcar_dmac_chan_get_residue() (bsc#1051510).\n- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bsc#1051510).\n- dmaengine: tegra-apb: Really fix runtime-pm usage (bsc#1051510).\n- dmaengine: tegra210-adma: fix of_irq_get() error check (bsc#1051510).\n- dmaengine: xilinx_dma: Fix error code format specifier (bsc#1051510).\n- dmaengine: zynqmp_dma: Fix race condition in the probe (bsc#1051510).\n- doc: Rename .system_keyring to .builtin_trusted_keys (bsc#1051510).\n- doc: SKB_GSO_[IPIP|SIT] have been replaced (bsc#1051510).\n- docs-rst: fix broken links to dynamic-debug-howto in kernel-parameters (bsc#1051510).\n- docs: segmentation-offloads.txt: Fix ref to SKB_GSO_TUNNEL_REMCSUM (bsc#1051510).\n- docu: admin-guide: intel_pstate: Fix sysfs path (bsc#1051510).\n- dp83640: Ensure against premature access to PHY registers after reset (bsc#1051510).\n- drbd: fix access after free (bsc#1051510).\n- driver core: Fix link to device power management documentation (bsc#1051510).\n- driver core: Partially revert \u0027driver core: correct device\u0027s shutdown order\u0027 (bsc#1051510).\n- drivers/firmware: psci_checker: Add missing destroy_timer_on_stack() (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301).\n- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301).\n- drivers: net: i40evf: use setup_timer() helper (bsc#1101816).\n- drivers: net: i40evf: use setup_timer() helper (bsc#1101816).\n- drm/bridge/sii8620: fix potential buffer overflow (bsc#1051510).\n- drm/exynos: Fix dma-buf import (bsc#1051510).\n- drm/i915/dp: Send DPCD ON for MST before phy_up (bsc#1051510).\n- drm/i915: Fix hotplug irq ack on i965/g4x (bsc#1051510).\n- drm/i915: Only call tasklet_kill() on the first prepare_reset (bsc#1051510).\n- drm/nouveau/drm/nouveau: Fix runtime pm leak in nv50_disp_atomic_commit() (bsc#1090888).\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1051510).\n- drm/nouveau: Avoid looping through fake MST connectors (bsc#1051510).\n- drm/nouveau: Use drm_connector_list_iter_* for iterating connectors (bsc#1051510).\n- drm/rockchip: Fix build warning in analogix_dp-rockchip.c (bsc#1085536).\n- drm/rockchip: analogix_dp: Remove unnecessary init code (bsc#1085536).\n- drm/rockchip: dw_hdmi: Move HDMI vpll clock enable to bind() (bsc#1087092).\n- drm/rockchip: inno_hdmi: Fix error handling path (bsc#1087092).\n- drm/rockchip: inno_hdmi: reorder clk_disable_unprepare call in unbind (bsc#1087092).\n- drm/tegra: Acquire a reference to the IOVA cache (bsc#1090888).\n- drm/udl: fix display corruption of the last line (bsc#1101337).\n- drm: Use kvzalloc for allocating blob property memory (bsc#1101352).\n- drm: mali-dp: Uninitialized variable in malidp_se_check_scaling() (bsc#1087092).\n- drm: rcar-du: Remove zpos field from rcar_du_vsp_plane_state structure (bsc#1085539).\n- drm: rcar-du: lvds: Fix LVDCR1 for R-Car gen3 (bsc#1085539).\n- dvb_frontend: do not use-after-free the frontend struct (bsc#1051510).\n- efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps() (bsc#1051510).\n- enic: do not overwrite error code (bsc#1037697).\n- enic: enable rq before updating rq descriptors (bsc#1037697).\n- enic: set DMA mask to 47 bit (networking-stable-18_06_08).\n- ethtool: add ethtool_intersect_link_masks (bsc#1101816).\n- ethtool: add ethtool_intersect_link_masks (bsc#1101816).\n- firewire: net: max MTU off by one (bsc#1051510).\n- firmware: arm_scpi: fix endianness of dev_id in struct dev_pstate_set (bsc#1051510).\n- firmware: dmi: Optimize dmi_matches (bsc#1051510).\n- firmware: tegra: Fix locking bugs in BpmP (bsc#1051510).\n- fix kabi due to perf_event.h uapi field change ().\n- fm10k: Fix configuration for macvlan offload (bsc#1101813).\n- fm10k: Fix configuration for macvlan offload (bsc#1101813).\n- fm10k: Fix misuse of net_ratelimit() (bsc#1101813).\n- fm10k: Fix misuse of net_ratelimit() (bsc#1101813).\n- fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813).\n- fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813).\n- fm10k: add missing fall through comment (bsc#1101813).\n- fm10k: add missing fall through comment (bsc#1101813).\n- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813).\n- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813).\n- fm10k: avoid needless delay when loading driver (bsc#1101813).\n- fm10k: avoid needless delay when loading driver (bsc#1101813).\n- fm10k: avoid possible truncation of q_vector-\u003ename (bsc#1101813).\n- fm10k: avoid possible truncation of q_vector-\u003ename (bsc#1101813).\n- fm10k: bump version number (bsc#1101813).\n- fm10k: bump version number (bsc#1101813).\n- fm10k: bump version number (bsc#1101813).\n- fm10k: bump version number (bsc#1101813).\n- fm10k: clarify action when updating the VLAN table (bsc#1101813).\n- fm10k: clarify action when updating the VLAN table (bsc#1101813).\n- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813).\n- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813).\n- fm10k: correct typo in fm10k_pf.c (bsc#1101813).\n- fm10k: correct typo in fm10k_pf.c (bsc#1101813).\n- fm10k: do not assume VLAN 1 is enabled (bsc#1101813).\n- fm10k: do not assume VLAN 1 is enabled (bsc#1101813).\n- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813).\n- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813).\n- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813).\n- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813).\n- fm10k: fix \u0027failed to kill vid\u0027 message for VF (bsc#1101813).\n- fm10k: fix \u0027failed to kill vid\u0027 message for VF (bsc#1101813).\n- fm10k: fix function doxygen comments (bsc#1101813).\n- fm10k: fix function doxygen comments (bsc#1101813).\n- fm10k: fix incorrect warning for function prototype (bsc#1101813).\n- fm10k: fix incorrect warning for function prototype (bsc#1101813).\n- fm10k: fix typos on fall through comments (bsc#1101813).\n- fm10k: fix typos on fall through comments (bsc#1101813).\n- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813).\n- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813).\n- fm10k: mark pm functions as __maybe_unused (bsc#1101813).\n- fm10k: mark pm functions as __maybe_unused (bsc#1101813).\n- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813).\n- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813).\n- fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813).\n- fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813).\n- fm10k: prepare_for_reset() when we lose pcie Link (bsc#1101813).\n- fm10k: prepare_for_reset() when we lose pcie Link (bsc#1101813).\n- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813).\n- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813).\n- fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813).\n- fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813).\n- fm10k: reschedule service event if we stall the PF\u0026lt;-\u003eSM mailbox (bsc#1101813).\n- fm10k: reschedule service event if we stall the PF-\u003eSM mailbox (bsc#1101813).\n- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813).\n- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813).\n- fm10k: simplify reading PFVFLRE register (bsc#1101813).\n- fm10k: simplify reading PFVFLRE register (bsc#1101813).\n- fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813).\n- fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813).\n- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813).\n- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813).\n- fm10k: use generic pm hooks instead of legacy pcie power hooks (bsc#1101813).\n- fm10k: use generic pm hooks instead of legacy pcie power hooks (bsc#1101813).\n- fm10k: use macro to avoid passing the array and size separately (bsc#1101813).\n- fm10k: use macro to avoid passing the array and size separately (bsc#1101813).\n- fm10k: use spinlock to implement mailbox lock (bsc#1101813).\n- fm10k: use spinlock to implement mailbox lock (bsc#1101813).\n- fm10k: use the MAC/VLAN queue for VF\u0026lt;-\u003ePF MAC/VLAN requests (bsc#1101813).\n- fm10k: use the MAC/VLAN queue for VF-\u003ePF MAC/VLAN requests (bsc#1101813).\n- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813).\n- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813).\n- fm10k: warn if the stat size is unknown (bsc#1101813).\n- fm10k: warn if the stat size is unknown (bsc#1101813).\n- fsi: core: register with postcore_initcall (bsc#1051510).\n- fuse: Remove the buggy retranslation of pids in fuse_dev_do_read (bsc#1051510).\n- fuse: atomic_o_trunc should truncate pagecache (bsc#1051510).\n- fuse: do not keep dead fuse_conn at fuse_fill_super() (bsc#1051510).\n- fuse: fix congested state leak on aborted connections (bsc#1051510).\n- fuse: fix control dir setup and teardown (bsc#1051510).\n- gpio: acpi: work around false-positive -Wstring-overflow warning (bsc#1051510).\n- gpio: brcmstb: allow all instances to be wakeup sources (bsc#1051510).\n- gpio: brcmstb: check return value of gpiochip_irqchip_add() (bsc#1051510).\n- gpio: brcmstb: correct the configuration of level interrupts (bsc#1051510).\n- gpio: brcmstb: release the bgpio lock during irq handlers (bsc#1051510).\n- gpio: brcmstb: switch to handle_level_irq flow (bsc#1051510).\n- gpio: pca953x: fix vendor prefix for PCA9654 (bsc#1051510).\n- gpio: reject invalid gpio before getting gpio_desc (bsc#1051510).\n- gpio: tegra: fix unbalanced chained_irq_enter/exit (bsc#1051510).\n- gpu: host1x: Acquire a reference to the IOVA cache (bsc#1090888).\n- hwmon: (aspeed-pwm) add THERMAL dependency (bsc#1051510).\n- hwmon: (ftsteutates) Fix clearing alarm sysfs entries (bsc#1051510).\n- hwmon: (ltc2990) Fix incorrect conversion of negative temperatures (bsc#1051510).\n- hwmon: (nct6683) Enable EC access if disabled at boot (bsc#1051510).\n- hwmon: (stts751) buffer overrun on wrong chip configuration (bsc#1051510).\n- hwmon: (tmp102) Fix first temperature reading (bsc#1051510).\n- hwmon: Deal with errors from the thermal subsystem (bsc#1051510).\n- hwrng: stm32 - add reset during probe (bsc#1051510).\n- i2c: axxia: enable clock before calling clk_get_rate() (bsc#1051510).\n- i2c: designware: Round down ACPI provided clk to nearest supported clk (bsc#1051510).\n- i2c: mux: pinctrl: mention correct module name in Kconfig help text (bsc#1051510).\n- i2c: tegra: Fix NACK error handling (bsc#1051510).\n- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816).\n- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816).\n- i40e/i40evf: Bump driver versions (bsc#1101816).\n- i40e/i40evf: Bump driver versions (bsc#1101816).\n- i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816).\n- i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816).\n- i40e/i40evf: Clean-up of bits related to using q_vector-\u003ereg_idx (bsc#1101816).\n- i40e/i40evf: Clean-up of bits related to using q_vector-\u003ereg_idx (bsc#1101816).\n- i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816).\n- i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816).\n- i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816).\n- i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816).\n- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816).\n- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816).\n- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816).\n- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816).\n- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816).\n- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816).\n- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816).\n- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816).\n- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816).\n- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816).\n- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816).\n- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816).\n- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816).\n- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816).\n- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816).\n- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816).\n- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816).\n- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816).\n- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816).\n- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816).\n- i40e/i40evf: do not trust VF to reset itself (bsc#1101816).\n- i40e/i40evf: do not trust VF to reset itself (bsc#1101816).\n- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816).\n- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816).\n- i40e/i40evf: organize and re-number feature flags (bsc#1101816).\n- i40e/i40evf: organize and re-number feature flags (bsc#1101816).\n- i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816).\n- i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816).\n- i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816).\n- i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816).\n- i40e/i40evf: use SW variables for hang detection (bsc#1101816).\n- i40e/i40evf: use SW variables for hang detection (bsc#1101816).\n- i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816).\n- i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816).\n- i40e: Add advertising 10G LR mode (bsc#1101816).\n- i40e: Add advertising 10G LR mode (bsc#1101816).\n- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816).\n- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816).\n- i40e: Add infrastructure for queue channel support (bsc#1101816).\n- i40e: Add infrastructure for queue channel support (bsc#1101816).\n- i40e: Add macro for PF reset bit (bsc#1101816).\n- i40e: Add macro for PF reset bit (bsc#1101816).\n- i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816).\n- i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816).\n- i40e: Add returning AQ critical error to SW (bsc#1101816).\n- i40e: Add returning AQ critical error to SW (bsc#1101816).\n- i40e: Add support for \u0027ethtool -m\u0027 (bsc#1101816).\n- i40e: Add support for \u0027ethtool -m\u0027 (bsc#1101816).\n- i40e: Cleanup i40e_vlan_rx_register (bsc#1101816).\n- i40e: Cleanup i40e_vlan_rx_register (bsc#1101816).\n- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816).\n- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816).\n- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816).\n- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816).\n- i40e: Display error message if module does not meet thermal requirements (bsc#1101816).\n- i40e: Display error message if module does not meet thermal requirements (bsc#1101816).\n- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816).\n- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816).\n- i40e: Fix FLR reset timeout issue (bsc#1101816).\n- i40e: Fix FLR reset timeout issue (bsc#1101816).\n- i40e: Fix a potential NULL pointer dereference (bsc#1101816).\n- i40e: Fix a potential NULL pointer dereference (bsc#1101816).\n- i40e: Fix for NUP NVM image downgrade failure (bsc#1101816).\n- i40e: Fix for NUP NVM image downgrade failure (bsc#1101816).\n- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816).\n- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816).\n- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816).\n- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816).\n- i40e: Fix kdump failure (bsc#1101816).\n- i40e: Fix kdump failure (bsc#1101816).\n- i40e: Fix link down message when interface is brought up (bsc#1101816).\n- i40e: Fix link down message when interface is brought up (bsc#1101816).\n- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816).\n- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816).\n- i40e: Fix permission check for VF MAC filters (bsc#1101816).\n- i40e: Fix permission check for VF MAC filters (bsc#1101816).\n- i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816).\n- i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816).\n- i40e: Fix reporting of supported link modes (bsc#1101816).\n- i40e: Fix reporting of supported link modes (bsc#1101816).\n- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816).\n- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816).\n- i40e: Fix unqualified module message while bringing link up (bsc#1101816).\n- i40e: Fix unqualified module message while bringing link up (bsc#1101816).\n- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816).\n- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816).\n- i40e: Prevent setting link speed on KX_X722 (bsc#1101816).\n- i40e: Prevent setting link speed on KX_X722 (bsc#1101816).\n- i40e: Properly maintain flow director filters list (bsc#1101816).\n- i40e: Properly maintain flow director filters list (bsc#1101816).\n- i40e: Remove limit of 64 max queues per channel (bsc#1101816).\n- i40e: Remove limit of 64 max queues per channel (bsc#1101816).\n- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816).\n- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816).\n- i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816).\n- i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816).\n- i40e: add check for return from find_first_bit call (bsc#1101816).\n- i40e: add check for return from find_first_bit call (bsc#1101816).\n- i40e: add doxygen comment for new mode parameter (bsc#1101816).\n- i40e: add doxygen comment for new mode parameter (bsc#1101816).\n- i40e: add function doc headers for ethtool stats functions (bsc#1101816).\n- i40e: add function doc headers for ethtool stats functions (bsc#1101816).\n- i40e: add function header for i40e_get_rxfh (bsc#1101816).\n- i40e: add function header for i40e_get_rxfh (bsc#1101816).\n- i40e: add helper conversion function for link_speed (bsc#1101816).\n- i40e: add helper conversion function for link_speed (bsc#1101816).\n- i40e: add tx_busy to ethtool stats (bsc#1101816).\n- i40e: add tx_busy to ethtool stats (bsc#1101816).\n- i40e: allow XPS with QoS enabled (bsc#1101816).\n- i40e: allow XPS with QoS enabled (bsc#1101816).\n- i40e: always return VEB stat strings (bsc#1101816).\n- i40e: always return VEB stat strings (bsc#1101816).\n- i40e: always return all queue stat strings (bsc#1101816).\n- i40e: always return all queue stat strings (bsc#1101816).\n- i40e: avoid divide by zero (bsc#1101816).\n- i40e: avoid divide by zero (bsc#1101816).\n- i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816).\n- i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816).\n- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816).\n- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816).\n- i40e: calculate ethtool stats size in a separate function (bsc#1101816).\n- i40e: calculate ethtool stats size in a separate function (bsc#1101816).\n- i40e: change flags to use 64 bits (bsc#1101816).\n- i40e: change flags to use 64 bits (bsc#1101816).\n- i40e: change ppp name to ddp (bsc#1101816).\n- i40e: change ppp name to ddp (bsc#1101816).\n- i40e: check for invalid DCB config (bsc#1101816).\n- i40e: check for invalid DCB config (bsc#1101816).\n- i40e: cleanup unnecessary parens (bsc#1101816).\n- i40e: cleanup unnecessary parens (bsc#1101816).\n- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816).\n- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816).\n- i40e: cleanup wording in a header comment (bsc#1101816).\n- i40e: cleanup wording in a header comment (bsc#1101816).\n- i40e: convert i40e_get_settings_link_up to new API (bsc#1101816).\n- i40e: convert i40e_get_settings_link_up to new API (bsc#1101816).\n- i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816).\n- i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816).\n- i40e: convert i40e_set_link_ksettings to new API (bsc#1101816).\n- i40e: convert i40e_set_link_ksettings to new API (bsc#1101816).\n- i40e: disallow programming multiple filters with same criteria (bsc#1101816).\n- i40e: disallow programming multiple filters with same criteria (bsc#1101816).\n- i40e: display priority_xon and priority_xoff stats (bsc#1101816).\n- i40e: display priority_xon and priority_xoff stats (bsc#1101816).\n- i40e: do not clear suspended state until we finish resuming (bsc#1101816).\n- i40e: do not clear suspended state until we finish resuming (bsc#1101816).\n- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816).\n- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816).\n- i40e: do not force filter failure in overflow promiscuous (bsc#1101816).\n- i40e: do not force filter failure in overflow promiscuous (bsc#1101816).\n- i40e: do not hold spinlock while resetting VF (bsc#1101816).\n- i40e: do not hold spinlock while resetting VF (bsc#1101816).\n- i40e: do not leak memory addresses (bsc#1101816).\n- i40e: do not leak memory addresses (bsc#1101816).\n- i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816).\n- i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816).\n- i40e: ensure reset occurs when disabling VF (bsc#1101816).\n- i40e: ensure reset occurs when disabling VF (bsc#1101816).\n- i40e: factor out re-enable functions for ATR and SB (bsc#1101816).\n- i40e: factor out re-enable functions for ATR and SB (bsc#1101816).\n- i40e: fix a typo (bsc#1101816).\n- i40e: fix a typo (bsc#1101816).\n- i40e: fix a typo in i40e_pf documentation (bsc#1101816).\n- i40e: fix a typo in i40e_pf documentation (bsc#1101816).\n- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816).\n- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816).\n- i40e: fix comment typo (bsc#1101816).\n- i40e: fix comment typo (bsc#1101816).\n- i40e: fix flags declaration (bsc#1101816).\n- i40e: fix flags declaration (bsc#1101816).\n- i40e: fix for flow director counters not wrapping as expected (bsc#1101816).\n- i40e: fix for flow director counters not wrapping as expected (bsc#1101816).\n- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816).\n- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816).\n- i40e: fix handling of vf_states variable (bsc#1101816).\n- i40e: fix handling of vf_states variable (bsc#1101816).\n- i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816).\n- i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816).\n- i40e: fix incorrect register definition (bsc#1101816).\n- i40e: fix incorrect register definition (bsc#1101816).\n- i40e: fix link reporting (bsc#1101816).\n- i40e: fix link reporting (bsc#1101816).\n- i40e: fix merge error (bsc#1101816).\n- i40e: fix merge error (bsc#1101816).\n- i40e: fix reading LLDP configuration (bsc#1101816).\n- i40e: fix reading LLDP configuration (bsc#1101816).\n- i40e: fix typo in function description (bsc#1101816).\n- i40e: fix typo in function description (bsc#1101816).\n- i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816).\n- i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816).\n- i40e: fold prefix strings directly into stat names (bsc#1101816).\n- i40e: fold prefix strings directly into stat names (bsc#1101816).\n- i40e: free skb after clearing lock in ptp_stop (bsc#1101816).\n- i40e: free skb after clearing lock in ptp_stop (bsc#1101816).\n- i40e: free the skb after clearing the bitlock (bsc#1101816).\n- i40e: free the skb after clearing the bitlock (bsc#1101816).\n- i40e: group autoneg PHY types together (bsc#1101816).\n- i40e: group autoneg PHY types together (bsc#1101816).\n- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816).\n- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816).\n- i40e: ignore skb-\u003exmit_more when deciding to set RS bit (bsc#1101816).\n- i40e: ignore skb-\u003exmit_more when deciding to set RS bit (bsc#1101816).\n- i40e: implement split pci error reset handler (bsc#1101816).\n- i40e: implement split pci error reset handler (bsc#1101816).\n- i40e: limit lan queue count in large CPU count machine (bsc#1101816).\n- i40e: limit lan queue count in large CPU count machine (bsc#1101816).\n- i40e: make const array patterns static, reduces object code size (bsc#1101816).\n- i40e: make const array patterns static, reduces object code size (bsc#1101816).\n- i40e: make i40evf_map_rings_to_vectors void (bsc#1101816).\n- i40e: make i40evf_map_rings_to_vectors void (bsc#1101816).\n- i40e: make use of i40e_vc_disable_vf (bsc#1101816).\n- i40e: make use of i40e_vc_disable_vf (bsc#1101816).\n- i40e: mark pm functions as __maybe_unused (bsc#1101816).\n- i40e: mark pm functions as __maybe_unused (bsc#1101816).\n- i40e: move AUTO_DISABLED flags into the state field (bsc#1101816).\n- i40e: move AUTO_DISABLED flags into the state field (bsc#1101816).\n- i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816).\n- i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816).\n- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816).\n- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816).\n- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816).\n- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816).\n- i40e: move client flags into state bits (bsc#1101816).\n- i40e: move client flags into state bits (bsc#1101816).\n- i40e: prevent service task from running while we\u0027re suspended (bsc#1101816).\n- i40e: prevent service task from running while we\u0027re suspended (bsc#1101816).\n- i40e: re-enable PTP L4 capabilities for XL710 if FW \u003e6.0 (bsc#1101816).\n- i40e: re-enable PTP L4 capabilities for XL710 if FW \u003e6.0 (bsc#1101816).\n- i40e: re-number feature flags to remove gaps (bsc#1101816).\n- i40e: re-number feature flags to remove gaps (bsc#1101816).\n- i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816).\n- i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816).\n- i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816).\n- i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816).\n- i40e: refactor FW version checking (bsc#1101816).\n- i40e: refactor FW version checking (bsc#1101816).\n- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816).\n- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816).\n- i40e: relax warning message in case of version mismatch (bsc#1101816).\n- i40e: relax warning message in case of version mismatch (bsc#1101816).\n- i40e: remove duplicate pfc stats (bsc#1101816).\n- i40e: remove duplicate pfc stats (bsc#1101816).\n- i40e: remove i40e_fcoe files (bsc#1101816).\n- i40e: remove i40e_fcoe files (bsc#1101816).\n- i40e: remove ifdef SPEED_25000 (bsc#1101816).\n- i40e: remove ifdef SPEED_25000 (bsc#1101816).\n- i40e: remove logically dead code (bsc#1101816).\n- i40e: remove logically dead code (bsc#1101816).\n- i40e: remove redundant initialization of read_size (bsc#1101816).\n- i40e: remove redundant initialization of read_size (bsc#1101816).\n- i40e: rename \u0027change\u0027 variable to \u0027autoneg_changed\u0027 (bsc#1101816).\n- i40e: rename \u0027change\u0027 variable to \u0027autoneg_changed\u0027 (bsc#1101816).\n- i40e: rename \u0027cmd\u0027 variables in ethtool interface (bsc#1101816).\n- i40e: rename \u0027cmd\u0027 variables in ethtool interface (bsc#1101816).\n- i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816).\n- i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816).\n- i40e: restore promiscuous after reset (bsc#1101816).\n- i40e: restore promiscuous after reset (bsc#1101816).\n- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816).\n- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816).\n- i40e: simplify member variable accesses (bsc#1101816).\n- i40e: simplify member variable accesses (bsc#1101816).\n- i40e: split i40e_get_strings() into smaller functions (bsc#1101816).\n- i40e: split i40e_get_strings() into smaller functions (bsc#1101816).\n- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816).\n- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816).\n- i40e: track filter type statistics when deleting invalid filters (bsc#1101816).\n- i40e: track filter type statistics when deleting invalid filters (bsc#1101816).\n- i40e: track id can be 0 (bsc#1101816).\n- i40e: track id can be 0 (bsc#1101816).\n- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816).\n- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816).\n- i40e: update data pointer directly when copying to the buffer (bsc#1101816).\n- i40e: update data pointer directly when copying to the buffer (bsc#1101816).\n- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816).\n- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816).\n- i40e: use a local variable instead of calculating multiple times (bsc#1101816).\n- i40e: use a local variable instead of calculating multiple times (bsc#1101816).\n- i40e: use admin queue for setting LEDs behavior (bsc#1101816).\n- i40e: use admin queue for setting LEDs behavior (bsc#1101816).\n- i40e: use newer generic pm support instead of legacy pm callbacks (bsc#1101816).\n- i40e: use newer generic pm support instead of legacy pm callbacks (bsc#1101816).\n- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816).\n- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816).\n- i40e: use the more traditional \u0027i\u0027 loop variable (bsc#1101816).\n- i40e: use the more traditional \u0027i\u0027 loop variable (bsc#1101816).\n- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816).\n- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816).\n- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816).\n- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816).\n- i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816).\n- i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816).\n- i40evf: Do not clear MSI-X PBA manually (bsc#1101816).\n- i40evf: Do not clear MSI-X PBA manually (bsc#1101816).\n- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816).\n- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816).\n- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816).\n- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816).\n- i40evf: Fix a hardware reset support in VF driver (bsc#1101816).\n- i40evf: Fix a hardware reset support in VF driver (bsc#1101816).\n- i40evf: Fix double locking the same resource (bsc#1101816).\n- i40evf: Fix double locking the same resource (bsc#1101816).\n- i40evf: Fix link up issue when queues are disabled (bsc#1101816).\n- i40evf: Fix link up issue when queues are disabled (bsc#1101816).\n- i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816).\n- i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816).\n- i40evf: Make VF reset warning message more clear (bsc#1101816).\n- i40evf: Make VF reset warning message more clear (bsc#1101816).\n- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816).\n- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816).\n- i40evf: Use an iterator of the same type as the list (bsc#1101816).\n- i40evf: Use an iterator of the same type as the list (bsc#1101816).\n- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816).\n- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816).\n- i40evf: fix client notify of l2 params (bsc#1101816).\n- i40evf: fix client notify of l2 params (bsc#1101816).\n- i40evf: fix ring to vector mapping (bsc#1101816).\n- i40evf: fix ring to vector mapping (bsc#1101816).\n- i40evf: hold the critical task bit lock while opening (bsc#1101816).\n- i40evf: hold the critical task bit lock while opening (bsc#1101816).\n- i40evf: lower message level (bsc#1101816).\n- i40evf: lower message level (bsc#1101816).\n- i40evf: release bit locks in reverse order (bsc#1101816).\n- i40evf: release bit locks in reverse order (bsc#1101816).\n- i40evf: remove flags that are never used (bsc#1101816).\n- i40evf: remove flags that are never used (bsc#1101816).\n- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816).\n- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816).\n- i40evf: use GFP_ATOMIC under spin lock (bsc#1101816).\n- i40evf: use GFP_ATOMIC under spin lock (bsc#1101816).\n- i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816).\n- i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816).\n- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816).\n- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816).\n- i40iw: Fix memory leak in error path of create QP (bsc#1058659).\n- i40iw: Fix memory leak in error path of create QP (bsc#1058659).\n- i40iw: Refactor of driver generated AEs (bsc#1058659).\n- i40iw: Refactor of driver generated AEs (bsc#1058659).\n- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659).\n- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659).\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659).\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659).\n- ib/core: Fix error code for invalid GID entry (bsc#1046306).\n- ib/core: Fix error code for invalid GID entry (bsc#1046306).\n- ib/core: Honor port_num while resolving GID for ib link layer (bsc#1046306).\n- ib/core: Honor port_num while resolving GID for ib link layer (bsc#1046306).\n- ib/core: Make ib_mad_client_id atomic (bsc#1046306).\n- ib/core: Make ib_mad_client_id atomic (bsc#1046306).\n- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306).\n- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306).\n- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306).\n- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306).\n- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463).\n- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463).\n- ib/hfi1: Fix fault injection init/exit issues (bsc#1060463).\n- ib/hfi1: Fix fault injection init/exit issues (bsc#1060463).\n- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463).\n- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463).\n- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463).\n- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463).\n- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463).\n- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463).\n- ib/iser: Do not reduce max_sectors (bsc#1046306).\n- ib/iser: Do not reduce max_sectors (bsc#1046306).\n- ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306).\n- ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306).\n- ib/isert: fix T10-pi check mask setting (bsc#1046306).\n- ib/isert: fix T10-pi check mask setting (bsc#1046306).\n- ib/mlx4: Fix an error handling path in \u0027mlx4_ib_rereg_user_mr()\u0027 (bsc#1046302).\n- ib/mlx4: Fix an error handling path in \u0027mlx4_ib_rereg_user_mr()\u0027 (bsc#1046302).\n- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302).\n- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302).\n- ib/mlx5: Fetch soft WQE\u0027s on fatal error state (bsc#1046305).\n- ib/mlx5: Fetch soft WQE\u0027s on fatal error state (bsc#1046305).\n- ib/mlx5: Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046305).\n- ib/mlx5: Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046305).\n- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301).\n- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301).\n- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306).\n- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306).\n- ib/rxe: add RXE_START_MASK for rxe_opcode ib_OPCODE_RC_SEND_ONLY_INV (bsc#1046306).\n- ib/rxe: add RXE_START_MASK for rxe_opcode ib_OPCODE_RC_SEND_ONLY_INV (bsc#1046306).\n- ib/rxe: avoid double kfree_skb (bsc#1046306).\n- ib/rxe: avoid double kfree_skb (bsc#1046306).\n- ib/umem: Use the correct mm during ib_umem_release (bsc#1046306).\n- ib/umem: Use the correct mm during ib_umem_release (bsc#1046306).\n- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306).\n- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- igb: Fix not adding filter elements to the list (bsc#1056651).\n- igb: Fix not adding filter elements to the list (bsc#1056651).\n- igb: Fix queue selection on MAC filters on i210 (bsc#1056651).\n- igb: Fix queue selection on MAC filters on i210 (bsc#1056651).\n- iio: BME280: Updates to Humidity readings need ctrl_reg write! (bsc#1051510).\n- iio: accel: st_accel: fix data-ready line configuration (bsc#1051510).\n- iio: accel: st_accel_i2c: fix i2c_device_id table (bsc#1051510).\n- iio: accel: st_accel_spi: fix spi_device_id table (bsc#1051510).\n- iio: adc: sun4i-gpadc-iio: fix unbalanced irq enable/disable (bsc#1051510).\n- iio: adc: twl4030: Return an error if we can not enable the vusb3v1 regulator in \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: gyro: st_gyro: fix L3GD20H support (bsc#1051510).\n- iio: humidity: hts221: remove warnings in hts221_parse_{temp,rh}_caldata() (bsc#1051510).\n- iio: imu: inv_mpu6050: test whoami first and against all known values (bsc#1051510).\n- iio: magnetometer: st_magn: fix drdy line configuration for LIS3MDL (bsc#1051510).\n- iio: magnetometer: st_magn_core: enable multiread by default for LIS3MDL (bsc#1051510).\n- iio: magnetometer: st_magn_spi: fix spi_device_id table (bsc#1051510).\n- iio: pressure: bmp280: fix relative humidity unit (bsc#1051510).\n- iio: pressure: st_pressure: fix drdy configuration for LPS22HB and LPS25H (bsc#1051510).\n- iio: pressure: zpa2326: Remove always-true check which confuses gcc (bsc#1051510).\n- iio: pressure: zpa2326: report interrupted case as failure (bsc#1051510).\n- iio: trigger: stm32-timer: fix quadrature mode get routine (bsc#1051510).\n- iio: trigger: stm32-timer: fix write_raw return value (bsc#1051510).\n- iio: tsl2583: correct values in integration_time_available (bsc#1051510).\n- infiniband: fix a possible use-after-free bug (bsc#1046306).\n- infiniband: fix a possible use-after-free bug (bsc#1046306).\n- iommu/vt-d: Clear Page Request Overflow fault bit ().\n- iommu/vt-d: Clear Page Request Overflow fault bit ().\n- ip6_tunnel: remove magic mtu value 0xFFF8 (networking-stable-18_06_08).\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1102512).\n- ipmr: properly check rhltable_init() return value (networking-stable-18_06_08).\n- ipv4: remove warning in ip_recv_error (networking-stable-18_06_08).\n- ipv6: allow pmTU exceptions to local routes (networking-stable-18_06_20).\n- ipv6: sr: fix memory OOB access in seg6_do_srh_encap/inline (networking-stable-18_06_08).\n- iw_cxgb4: Add ib_device-\u003eget_netdev support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543).\n- iw_cxgb4: initialize ib_mr fields for user mrs (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674).\n- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674).\n- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674).\n- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674).\n- ixgbe: Add receive length error counter (bsc#1101674).\n- ixgbe: Add receive length error counter (bsc#1101674).\n- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674).\n- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674).\n- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674).\n- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674).\n- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674).\n- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674).\n- ixgbe: Clear SWFW_SYNC register during init (bsc#1101674).\n- ixgbe: Clear SWFW_SYNC register during init (bsc#1101674).\n- ixgbe: Default to 1 pool always being allocated (bsc#1101674).\n- ixgbe: Default to 1 pool always being allocated (bsc#1101674).\n- ixgbe: Do not assume dev-\u003enum_tc is equal to hardware TC config (bsc#1101674).\n- ixgbe: Do not assume dev-\u003enum_tc is equal to hardware TC config (bsc#1101674).\n- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674).\n- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674).\n- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674).\n- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674).\n- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674).\n- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674).\n- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674).\n- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674).\n- ixgbe: Fix \u0026\u0026 vs || typo (bsc#1101674).\n- ixgbe: Fix handling of macvlan Tx offload (bsc#1101674).\n- ixgbe: Fix handling of macvlan Tx offload (bsc#1101674).\n- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674).\n- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674).\n- ixgbe: Fix kernel-doc format warnings (bsc#1101674).\n- ixgbe: Fix kernel-doc format warnings (bsc#1101674).\n- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674).\n- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674).\n- ixgbe: Fix logic operator typo (bsc#1101674).\n- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674).\n- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674).\n- ixgbe: Perform reinit any time number of VFs change (bsc#1101674).\n- ixgbe: Perform reinit any time number of VFs change (bsc#1101674).\n- ixgbe: Remove an obsolete comment about ITR (bsc#1101674).\n- ixgbe: Remove an obsolete comment about ITR (bsc#1101674).\n- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674).\n- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674).\n- ixgbe: Update adaptive ITR algorithm (bsc#1101674).\n- ixgbe: Update adaptive ITR algorithm (bsc#1101674).\n- ixgbe: Use ring values to test for Tx pending (bsc#1101674).\n- ixgbe: Use ring values to test for Tx pending (bsc#1101674).\n- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674).\n- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674).\n- ixgbe: add error checks when initializing the PHY (bsc#1101674).\n- ixgbe: add error checks when initializing the PHY (bsc#1101674).\n- ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674).\n- ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674).\n- ixgbe: add support for reporting 5G link speed (bsc#1101674).\n- ixgbe: add support for reporting 5G link speed (bsc#1101674).\n- ixgbe: advertise highest capable link speed (bsc#1101674).\n- ixgbe: advertise highest capable link speed (bsc#1101674).\n- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674).\n- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674).\n- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674).\n- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674).\n- ixgbe: enable multicast on shutdown for WOL (bsc#1101674).\n- ixgbe: enable multicast on shutdown for WOL (bsc#1101674).\n- ixgbe: extend firmware version support (bsc#1101674).\n- ixgbe: extend firmware version support (bsc#1101674).\n- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674).\n- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674).\n- ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674).\n- ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674).\n- ixgbe: fix possible race in reset subtask (bsc#1101674).\n- ixgbe: fix possible race in reset subtask (bsc#1101674).\n- ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674).\n- ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674).\n- ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674).\n- ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674).\n- ixgbe: force VF to grab new MAC on driver reload (bsc#1101674).\n- ixgbe: force VF to grab new MAC on driver reload (bsc#1101674).\n- ixgbe: introduce a helper to simplify code (bsc#1101674).\n- ixgbe: introduce a helper to simplify code (bsc#1101674).\n- ixgbe: remove redundant initialization of \u0027pool\u0027 (bsc#1101674).\n- ixgbe: remove redundant initialization of \u0027pool\u0027 (bsc#1101674).\n- ixgbe: remove unused enum latency_range (bsc#1101674).\n- ixgbe: remove unused enum latency_range (bsc#1101674).\n- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674).\n- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674).\n- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674).\n- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674).\n- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674).\n- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674).\n- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674).\n- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674).\n- ixgbevf: Fix kernel-doc format warnings (bsc#1101674).\n- ixgbevf: Fix kernel-doc format warnings (bsc#1101674).\n- ixgbevf: add build_skb support (bsc#1101674).\n- ixgbevf: add build_skb support (bsc#1101674).\n- ixgbevf: add counters for Rx page allocations (bsc#1101674).\n- ixgbevf: add counters for Rx page allocations (bsc#1101674).\n- ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674).\n- ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674).\n- ixgbevf: add function for checking if we can reuse page (bsc#1101674).\n- ixgbevf: add function for checking if we can reuse page (bsc#1101674).\n- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674).\n- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674).\n- ixgbevf: add support for padding packet (bsc#1101674).\n- ixgbevf: add support for padding packet (bsc#1101674).\n- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674).\n- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674).\n- ixgbevf: allocate the rings as part of q_vector (bsc#1101674).\n- ixgbevf: allocate the rings as part of q_vector (bsc#1101674).\n- ixgbevf: break out Rx buffer page management (bsc#1101674).\n- ixgbevf: break out Rx buffer page management (bsc#1101674).\n- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674).\n- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674).\n- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674).\n- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674).\n- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674).\n- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674).\n- ixgbevf: fix ixgbevf_xmit_frame()\u0027s return type (bsc#1101674).\n- ixgbevf: fix ixgbevf_xmit_frame()\u0027s return type (bsc#1101674).\n- ixgbevf: fix possible race in the reset subtask (bsc#1101674).\n- ixgbevf: fix possible race in the reset subtask (bsc#1101674).\n- ixgbevf: fix unused variable warning (bsc#1101674).\n- ixgbevf: fix unused variable warning (bsc#1101674).\n- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674).\n- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674).\n- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674).\n- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674).\n- ixgbevf: only DMA sync frame length (bsc#1101674).\n- ixgbevf: only DMA sync frame length (bsc#1101674).\n- ixgbevf: remove redundant initialization of variable \u0027dma\u0027 (bsc#1101674).\n- ixgbevf: remove redundant initialization of variable \u0027dma\u0027 (bsc#1101674).\n- ixgbevf: remove redundant setting of xcast_mode (bsc#1101674).\n- ixgbevf: remove redundant setting of xcast_mode (bsc#1101674).\n- ixgbevf: setup queue counts (bsc#1101674).\n- ixgbevf: setup queue counts (bsc#1101674).\n- ixgbevf: update code to better handle incrementing page count (bsc#1101674).\n- ixgbevf: update code to better handle incrementing page count (bsc#1101674).\n- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674).\n- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674).\n- ixgbevf: use length to determine if descriptor is done (bsc#1101674).\n- ixgbevf: use length to determine if descriptor is done (bsc#1101674).\n- ixgbevf: use page_address offset from page (bsc#1101674).\n- ixgbevf: use page_address offset from page (bsc#1101674).\n- jump_label: Add branch hints to static_branch_{un,}likely() (bnc#1101669 optimise numa balancing for fast migrate).\n- kABI: fixes for nvme (bsc#1077989).\n- kABI: fixes for qla2xxx (bsc#1077989).\n- kabi mlx5 hide cpu_rmap (bsc#1046303).\n- kabi/severities: add qed inter module symbols to kabi ignore list\n- kabi: breakage for of/device change (bsc#1051510).\n- kabi: cxgb4 MU (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- kabi: due to perf_event.h uapi field change ().\n- kabi: for rtl_deinit_deferred_work() rewrite (bsc#1051510).\n- kabi: mlx5 hide cpu_rmap (bsc#1046303).\n- kabi: mvpp2 10gkr support (bsc#1098633).\n- kabi: powerpc: mmu_context: provide old version of mm_iommu_ua_to_hpa (bsc#1077761, git-fixes).\n- kabi: protect fwnode_handle (bsc#1098633).\n- kcm: Fix use-after-free caused by clonned sockets (networking-stable-18_06_08).\n- kernel/params.c: downgrade warning for unsafe parameters (bsc#1051510).\n- keys: DNS: fix parsing multiple options (bsc#1051510).\n- kvm: PPC: Check if IOMMU page is contained in the pinned physical page (bsc#1077761, git-fixes).\n- kvm: x86: fix vcpu initialization with userspace lapic (bsc#1101564).\n- kvm: x86: move LAPIC initialization after VMCS creation (bsc#1101564).\n- libnvdimm, label: fix index block size calculation (bsc#1102147).\n- libnvdimm: add an api to cast a \u0027struct nd_region\u0027 to its \u0027struct device\u0027 (bsc#1094119).\n- mailbox: PCC: erroneous error message when parsing ACPI PCCT (bsc#1096330).\n- mailbox: bcm2835: Fix of_xlate return value (bsc#1051510).\n- mdio-sun4i: Fix a memory leak (bsc#1051510).\n- media: coda/imx-vdoa: Check for platform_get_resource() error (bsc#1051510).\n- media: cx25840: Use subdev host data for PLL override (bsc#1051510).\n- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1051510).\n- media: cxusb: restore RC_MAP for MyGica T230 (bsc#1051510).\n- media: dt-bindings: media: rcar_vin: Use status \u0027okay\u0027 (bsc#1051510).\n- media: dvb-core: always call invoke_release() in fe_free() (bsc#1051510).\n- media: dvb_frontend: fix ifnullfree.cocci warnings (bsc#1051510).\n- media: dvb_frontend: only use kref after initialized (bsc#1051510).\n- media: dvb_net: ensure that dvb_net_ule_handle is fully initialized (bsc#1051510).\n- media: mxl111sf: Fix potential null pointer dereference (bsc#1051510).\n- media: omap3isp/isp: remove an unused static var (bsc#1051510).\n- media: s5p-jpeg: fix number of components macro (bsc#1051510).\n- media: s5p-mfc: Fix lock contention - request_firmware() once (bsc#1051510).\n- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bsc#1051510).\n- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#1051510).\n- mfd: tps65218: Reorder tps65218_regulator_id enum (bsc#1051510).\n- mfd: tps65911-comparator: Fix a build error (bsc#1051510).\n- mfd: tps65911-comparator: Fix an off by one bug (bsc#1051510).\n- mlxsw: spectrum: Forbid creation of VLAN 1 over port/LAG (networking-stable-18_06_08).\n- mmc: cavium: Fix use-after-free in of_platform_device_destroy (bsc#1051510).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1051510).\n- mmc: meson-gx: remove CLK_DIVIDER_ALLOW_ZERO clock flag (bsc#1051510).\n- mmc: sdhci-msm: fix issue with power irq (bsc#1051510).\n- mmc: sdhci-of-esdhc: disable SD clock for clock value 0 (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix eMMC couldn\u0027t work after kexec (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix the mmc error after sleep on ls1046ardb (bsc#1051510).\n- mmc: sdhci-xenon: Fix clock resource by adding an optional bus clock (bsc#1051510).\n- mmc: sdhci-xenon: wait 5ms after set 1.8V signal enable (bsc#1051510).\n- mmc: tmio: remove outdated comment (bsc#1051510).\n- modsign: log module name in the event of an error (bsc#1093666).\n- modsign: print module name along with error message (bsc#1093666).\n- module: make it clear when we\u0027re handling the module copy in info-\u003ehdr (bsc#1093666).\n- module: setup load info before module_sig_check() (bsc#1093666).\n- mvpp2: fix multicast address filter (bsc#1098633).\n- net-sysfs: Fix memory leak in XPS configuration (networking-stable-18_06_08).\n- net/mlx4: Fix irq-unsafe spinlock usage (networking-stable-18_06_08).\n- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300).\n- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300).\n- net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299).\n- net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299).\n- net/mlx5: Adjust clock overflow work period (bsc#1046303).\n- net/mlx5: Adjust clock overflow work period (bsc#1046303).\n- net/mlx5: Eswitch, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303).\n- net/mlx5: Eswitch, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303).\n- net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303).\n- net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303).\n- net/mlx5: Fix command interface race in polling mode (bsc#1046300).\n- net/mlx5: Fix command interface race in polling mode (bsc#1046300).\n- net/mlx5: Fix dump_command mailbox length printed (bsc#1046303).\n- net/mlx5: Fix dump_command mailbox length printed (bsc#1046303).\n- net/mlx5: Fix incorrect raw command length parsing (bsc#1046300).\n- net/mlx5: Fix incorrect raw command length parsing (bsc#1046300).\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300).\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300).\n- net/mlx5: Free IRQs in shutdown path (bsc#1046303).\n- net/mlx5: Free IRQs in shutdown path (bsc#1046303).\n- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303).\n- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303).\n- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303).\n- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303).\n- net/mlx5: Protect from command bit overflow (bsc#1046303).\n- net/mlx5: Protect from command bit overflow (bsc#1046303).\n- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303).\n- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303).\n- net/mlx5: Vport, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303).\n- net/mlx5: Vport, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303).\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303).\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303).\n- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300).\n- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300).\n- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303).\n- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303).\n- net/mlx5e: Refine ets validation function (bsc#1075360).\n- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303).\n- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303).\n- net/mlx5e: When RXFCS is set, add FCS data into checksum calculation (networking-stable-18_06_08).\n- net/packet: refine check for priv area size (networking-stable-18_06_08).\n- net/sched: act_simple: fix parsing of TCA_DEF_DATA (networking-stable-18_06_20).\n- net/sched: act_tunnel_key: fix NULL dereference when \u0027goto chain\u0027 is used (bsc#1056787).\n- net/sched: fix NULL dereference in the error path of tcf_sample_init() (bsc#1056787).\n- net: add rb_to_skb() and other rb tree helpers (bsc#1102340).\n- net: cxgb3_main: fix potential Spectre v1 (bsc#1046533).\n- net: cxgb3_main: fix potential Spectre v1 (bsc#1046533).\n- net: define the TSO header size in net/tso.h (bsc#1098633).\n- net: dsa: add error handling for pskb_trim_rcsum (networking-stable-18_06_20).\n- net: ethernet: davinci_emac: fix error handling in probe() (networking-stable-18_06_08).\n- net: ethernet: ti: cpdma: correct error handling for chan create (networking-stable-18_06_08).\n- net: ethtool: Add macro to clear a link mode setting (bsc#1101816).\n- net: ethtool: Add macro to clear a link mode setting (bsc#1101816).\n- net: in virtio_net_hdr only add VLAN_HLEN to csum_start if payload holds vlan (networking-stable-18_06_20).\n- net: ipv4: add missing RTA_TABLE to rtm_ipv4_policy (networking-stable-18_06_08).\n- net: metrics: add proper netlink validation (networking-stable-18_06_08).\n- net: mvmdio: add xmdio xsmi support (bsc#1098633).\n- net: mvmdio: check the MII_ADDR_C45 bit is not set for smi operations (bsc#1098633).\n- net: mvmdio: introduce an ops structure (bsc#1098633).\n- net: mvmdio: put the poll intervals in the ops structure (bsc#1098633).\n- net: mvmdio: remove duplicate locking (bsc#1098633).\n- net: mvmdio: reorder headers alphabetically (bsc#1098633).\n- net: mvmdio: simplify the smi read and write error paths (bsc#1098633).\n- net: mvmdio: use GENMASK for masks (bsc#1098633).\n- net: mvmdio: use tabs for defines (bsc#1098633).\n- net: mvpp2: Add hardware offloading for VLAN filtering (bsc#1098633).\n- net: mvpp2: Add support for unicast filtering (bsc#1098633).\n- net: mvpp2: Do not use dynamic allocs for local variables (bsc#1098633).\n- net: mvpp2: Fix DMA address mask size (bsc#1098633).\n- net: mvpp2: Fix TCAM filter reserved range (bsc#1098633).\n- net: mvpp2: Fix clk error path in mvpp2_probe (bsc#1098633).\n- net: mvpp2: Fix clock resource by adding an optional bus clock (bsc#1098633).\n- net: mvpp2: Fix clock resource by adding missing mg_core_clk (bsc#1098633).\n- net: mvpp2: Fix parser entry init boundary check (bsc#1098633).\n- net: mvpp2: Make mvpp2_prs_hw_read a parser entry init function (bsc#1098633).\n- net: mvpp2: Prevent userspace from changing TX affinities (bsc#1098633).\n- net: mvpp2: Simplify MAC filtering function parameters (bsc#1098633).\n- net: mvpp2: Use relaxed I/O in data path (bsc#1098633).\n- net: mvpp2: add comments about smp_processor_id() usage (bsc#1098633).\n- net: mvpp2: add ethtool GOP statistics (bsc#1098633).\n- net: mvpp2: add support for TX interrupts and RX queue distribution modes (bsc#1098633).\n- net: mvpp2: adjust the coalescing parameters (bsc#1098633).\n- net: mvpp2: align values in ethtool get_coalesce (bsc#1098633).\n- net: mvpp2: allocate zeroed tx descriptors (bsc#1098633).\n- net: mvpp2: check ethtool sets the Tx ring size is to a valid min value (bsc#1098633).\n- net: mvpp2: cleanup probed ports in the probe error path (bsc#1098633).\n- net: mvpp2: do not call txq_done from the Tx path when Tx irqs are used (bsc#1098633).\n- net: mvpp2: do not disable GMAC padding (bsc#1098633).\n- net: mvpp2: do not select the internal source clock (bsc#1098633).\n- net: mvpp2: do not set GMAC autoneg when using XLG MAC (bsc#1098633).\n- net: mvpp2: do not sleep in set_rx_mode (bsc#1098633).\n- net: mvpp2: do not unmap TSO headers buffers (bsc#1098633).\n- net: mvpp2: dynamic reconfiguration of the comphy/GoP/MAC (bsc#1098633).\n- net: mvpp2: enable ACPI support in the driver (bsc#1098633).\n- net: mvpp2: enable UDP/TCP checksum over IPv6 (bsc#1098633).\n- net: mvpp2: enable basic 10G support (bsc#1098633).\n- net: mvpp2: fallback using h/w and random mac if the dt one isn\u0027t valid (bsc#1098633).\n- net: mvpp2: fix GOP statistics loop start and stop conditions (bsc#1098633).\n- net: mvpp2: fix MVPP21_ISR_RXQ_GROUP_REG definition (bsc#1098633).\n- net: mvpp2: fix TSO headers allocation and management (bsc#1098633).\n- net: mvpp2: fix invalid parameters order when calling the tcam init (bsc#1098633).\n- net: mvpp2: fix parsing fragmentation detection (bsc#1098633).\n- net: mvpp2: fix port list indexing (bsc#1098633).\n- net: mvpp2: fix the RSS table entry offset (bsc#1098633).\n- net: mvpp2: fix the packet size configuration for 10G (bsc#1098633).\n- net: mvpp2: fix the synchronization module bypass macro name (bsc#1098633).\n- net: mvpp2: fix the txq_init error path (bsc#1098633).\n- net: mvpp2: fix typo in the tcam setup (bsc#1098633).\n- net: mvpp2: fix use of the random mac address for PPv2.2 (bsc#1098633).\n- net: mvpp2: improve the link management function (bsc#1098633).\n- net: mvpp2: initialize the GMAC when using a port (bsc#1098633).\n- net: mvpp2: initialize the GoP (bsc#1098633).\n- net: mvpp2: initialize the RSS tables (bsc#1098633).\n- net: mvpp2: initialize the Tx FIFO size (bsc#1098633).\n- net: mvpp2: initialize the XLG MAC when using a port (bsc#1098633).\n- net: mvpp2: initialize the comphy (bsc#1098633).\n- net: mvpp2: introduce per-port nrxqs/ntxqs variables (bsc#1098633).\n- net: mvpp2: introduce queue_vector concept (bsc#1098633).\n- net: mvpp2: jumbo frames support (bsc#1098633).\n- net: mvpp2: limit TSO segments and use stop/wake thresholds (bsc#1098633).\n- net: mvpp2: make the phy optional (bsc#1098633).\n- net: mvpp2: move from cpu-centric naming to \u0027software thread\u0027 naming (bsc#1098633).\n- net: mvpp2: move the mac retrieval/copy logic into its own function (bsc#1098633).\n- net: mvpp2: move the mii configuration in the ndo_open path (bsc#1098633).\n- net: mvpp2: mvpp2_check_hw_buf_num() can be static (bsc#1098633).\n- net: mvpp2: only free the TSO header buffers when it was allocated (bsc#1098633).\n- net: mvpp2: remove RX queue group reset code (bsc#1098633).\n- net: mvpp2: remove mvpp2_pool_refill() (bsc#1098633).\n- net: mvpp2: remove unused mvpp2_bm_cookie_pool_set() function (bsc#1098633).\n- net: mvpp2: remove useless goto (bsc#1098633).\n- net: mvpp2: report the tx-usec coalescing information to ethtool (bsc#1098633).\n- net: mvpp2: set maximum packet size for 10G ports (bsc#1098633).\n- net: mvpp2: set the Rx FIFO size depending on the port speeds for PPv2.2 (bsc#1098633).\n- net: mvpp2: simplify maintaining enabled ports\u0027 list (bsc#1098633).\n- net: mvpp2: simplify the Tx desc set DMA logic (bsc#1098633).\n- net: mvpp2: simplify the link_event function (bsc#1098633).\n- net: mvpp2: software tso support (bsc#1098633).\n- net: mvpp2: split the max ring size from the default one (bsc#1098633).\n- net: mvpp2: take advantage of the is_rgmii helper (bsc#1098633).\n- net: mvpp2: unify register definitions coding style (bsc#1098633).\n- net: mvpp2: unify the txq size define use (bsc#1098633).\n- net: mvpp2: update the BM buffer free/destroy logic (bsc#1098633).\n- net: mvpp2: use a data size of 10kB for Tx FIFO on port 0 (bsc#1098633).\n- net: mvpp2: use correct index on array mvpp2_pools (bsc#1098633).\n- net: mvpp2: use device_*/fwnode_* APIs instead of of_* (bsc#1098633).\n- net: mvpp2: use the GoP interrupt for link status changes (bsc#1098633).\n- net: mvpp2: use the aggr txq size define everywhere (bsc#1098633).\n- net: mvpp2: use the same buffer pool for all ports (bsc#1098633).\n- net: phy: add XAUI and 10GBASE-KR PHY connection types (bsc#1098633).\n- net: phy: broadcom: Fix auxiliary control register reads (networking-stable-18_06_08).\n- net: phy: broadcom: Fix bcm_write_exp() (networking-stable-18_06_08).\n- net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE for DP83620 (networking-stable-18_06_20).\n- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301).\n- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301).\n- net: sched: red: avoid hashing NULL child (bsc#1056787).\n- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (networking-stable-18_06_08).\n- netdev-FAQ: clarify DaveM\u0027s position for stable backports (networking-stable-18_06_08).\n- nfc: nfcmrvl_uart: fix device-node leak during probe (bsc#1051510).\n- nfc: pn533: Fix wrong GFP flag usage (bsc#1051510).\n- nfit, address-range-scrub: add module option to skip initial ars (bsc#1094119).\n- nfit, address-range-scrub: determine one platform max_ars value (bsc#1094119).\n- nfit, address-range-scrub: fix scrub in-progress reporting (bsc#1051510).\n- nfit, address-range-scrub: introduce nfit_spa-\u003ears_state (bsc#1094119).\n- nfit, address-range-scrub: rework and simplify ARS state machine (bsc#1094119).\n- nfit: fix region registration vs block-data-window ranges (bsc#1051510).\n- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1051510).\n- nvme-loop: add support for multiple ports (bsc#1054245).\n- nvme.h: add AEN configuration symbols (bsc#1054245).\n- nvme.h: add ANA definitions (bsc#1054245).\n- nvme.h: add support for the log specific field (bsc#1054245).\n- nvme.h: add the changed namespace list log (bsc#1054245).\n- nvme.h: untangle AEN notice definitions (bsc#1054245).\n- nvme/multipath: Disable runtime writable enabling parameter (bsc#1054245).\n- nvme: Fix sync controller reset return (bsc#1077989).\n- nvme: add ANA support (bsc#1054245).\n- nvme: add bio remapping tracepoint (bsc#1054245).\n- nvme: centralize ctrl removal prints (bsc#1054245).\n- nvme: cleanup double shift issue (bsc#1054245).\n- nvme: do not enable AEN if not supported (bsc#1077989).\n- nvme: do not hold nvmf_transports_rwsem for more than transport lookups (bsc#1054245).\n- nvme: do not rely on the changed namespace list log (bsc#1054245).\n- nvme: enforce 64bit offset for nvme_get_log_ext fn (bsc#1054245).\n- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD (,).\n- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD ().\n- nvme: fix use-after-free in nvme_free_ns_head (bsc#1054245).\n- nvme: guard additional fields in nvme command structures (bsc#1054245).\n- nvme: host: core: fix precedence of ternary operator (bsc#1054245).\n- nvme: if_ready checks to fail io to deleting controller (bsc#1077989).\n- nvme: implement log page low/high offset and dwords (bsc#1054245).\n- nvme: kABI fix for ANA support in nvme_ctrl (bsc#1054245).\n- nvme: kABI fixes for nvmet_ctrl (bsc#1054245).\n- nvme: kabi fixes for nvme_ctrl (bsc#1054245).\n- nvme: make nvme_get_log_ext non-static (bsc#1054245).\n- nvme: mark nvme_queue_scan static (bsc#1054245).\n- nvme: partially revert \u0027nvme: remove nvme_req_needs_failover\u0027 (bsc#1054245).\n- nvme: reintruduce nvme_get_log_ext() (bsc#1054245).\n- nvme: remove nvme_req_needs_failover (bsc#1054245).\n- nvme: revert \u0027nvme: mark nvme_queue_scan static\u0027 (bsc#1054245).\n- nvme: simplify the API for getting log pages (bsc#1054245).\n- nvme: submit AEN event configuration on startup (bsc#1054245).\n- nvme: use the changed namespaces list log to clear ns data changed AENs (bsc#1054245).\n- nvmet-fc: fix target sgl list on large transfers ().\n- nvmet-fc: fix target sgl list on large transfers (,).\n- nvmet: add AEN configuration support (bsc#1054245).\n- nvmet: add a new nvmet_zero_sgl helper (bsc#1054245).\n- nvmet: add minimal ANA support (bsc#1054245).\n- nvmet: constify struct nvmet_fabrics_ops (bsc#1054245).\n- nvmet: filter newlines from user input (bsc#1054245).\n- nvmet: fixup crash on NULL device path (bsc#1054245).\n- nvmet: implement the changed namespaces log (bsc#1054245).\n- nvmet: kABI fixes for ANA support (bsc#1054245).\n- nvmet: keep a port pointer in nvmet_ctrl (bsc#1054245).\n- nvmet: mask pending AENs (bsc#1054245).\n- nvmet: reset keep alive timer in controller enable (bsc#1054245).\n- nvmet: return all zeroed buffer when we can\u0027t find an active namespace (bsc#1054245).\n- nvmet: revert \u0027nvmet: constify struct nvmet_fabrics_ops\u0027 (bsc#1054245).\n- nvmet: split log page implementation (bsc#1054245).\n- nvmet: support configuring ANA groups (bsc#1054245).\n- nvmet: track and limit the number of namespaces per subsystem (1054245).\n- nvmet: use Retain Async Event bit to clear AEN (bsc#1054245).\n- of/pci: Fix theoretical NULL dereference (bsc#1051510).\n- of: Make of_fwnode_handle() safer (bsc#1098633).\n- of: fix DMA mask generation (bsc#1051510).\n- of: restrict DMA configuration (bsc#1051510).\n- pci: Account for all bridges on bus when distributing bus numbers (bsc#1100132).\n- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1051510).\n- pci: dwc: Fix enumeration end when reaching root subordinate (bsc#1100132).\n- pci: endpoint: Fix kernel panic after put_device() (bsc#1051510).\n- pci: endpoint: Populate func_no before calling pci_epc_add_epf() (bsc#1051510).\n- pci: exynos: Fix a potential init_clk_resources NULL pointer dereference (bsc#1051510).\n- pci: faraday: Fix of_irq_get() error check (bsc#1051510).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1051510).\n- pci: shpchp: Fix AMD POGO identification (bsc#1051510).\n- perf intel-pt: Always set no branch for dummy event (bsc#1087217).\n- perf intel-pt: Set no_aux_samples for the tracking event (bsc#1087217).\n- perf/x86/intel/uncore: Add event constraint for BDX PCU (bsc#1087202).\n- perf/x86/intel/uncore: Fix SKX CHA event extra regs (bsc#1087233).\n- perf/x86/intel/uncore: Fix Skylake UPI pmU event masks (bsc#1087233).\n- perf/x86/intel/uncore: Fix Skylake server CHA LLC_LOOKUP event umask (bsc#1087233).\n- perf/x86/intel/uncore: Fix Skylake server PCU pmU event format (bsc#1087233).\n- perf/x86/intel/uncore: Fix missing marker for skx_uncore_cha_extra_regs (bsc#1087233).\n- perf/x86/intel/uncore: Remove invalid Skylake server CHA filter field (bsc#1087233).\n- perf/x86: Fix data source decoding for Skylake ().\n- perf/x86: Fix data source decoding for Skylake ().\n- phy: add sgmii and 10gkr modes to the phy_mode enum (bsc#1098633).\n- pinctrl: bcm2835: Avoid warning from __irq_do_set_handler (bsc#1051510).\n- pinctrl: imx: fix debug message for SHARE_MUX_CONF_REG case (bsc#1051510).\n- pinctrl: intel: Initialize GPIO properly when used through irqchip (bsc#1087092).\n- pinctrl: intel: Read back TX buffer state (bsc#1051510).\n- pinctrl: meson-gxbb: remove non-existing pin GPIOX_22 (bsc#1051510).\n- pinctrl: meson-gxl: Fix typo in AO I2S pins (bsc#1051510).\n- pinctrl: meson-gxl: Fix typo in AO SPDIF pins (bsc#1051510).\n- pinctrl: mvebu: use correct MPP sel value for dev pins (bsc#1051510).\n- pinctrl: nand: meson-gxbb: fix missing data pins (bsc#1051510).\n- pinctrl: nsp: Fix potential NULL dereference (bsc#1051510).\n- pinctrl: nsp: off by ones in nsp_pinmux_enable() (bsc#1100132).\n- pinctrl: pinctrl-single: Fix pcs_request_gpio() when bits_per_mux != 0 (bsc#1051510).\n- pinctrl: sh-pfc: r8a7790: Add missing TX_ER pin to avb_mii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7795: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7795: Fix to delete A20..A25 pins function definitions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7796: Fix IPSR and MOD_SEL register pin assignment for NDFC pins group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7796: Fix to delete A20..A25 pins function definitions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7796: Fix to delete FSCLKST pin and IPSR7 bit[15:12] register definitions (bsc#1051510).\n- pinctrl: sunxi: fix V3s pinctrl driver IRQ bank base (bsc#1051510).\n- pinctrl: sunxi: fix wrong irq_banks number for H5 pinctrl (bsc#1051510).\n- pinctrl: uniphier: fix members of rmii group for Pro4 (bsc#1051510).\n- pinctrl: uniphier: fix pin_config_get() for input-enable (bsc#1051510).\n- pm/core: Fix supplier device runtime pm usage counter imbalance (bsc#1051510).\n- pm/hibernate: Fix oops at snapshot_write() (bsc#1051510).\n- pm/hibernate: Use CONFIG_HAVE_SET_MEMORY for include condition (bsc#1051510).\n- pm/wakeup: Only update last time for active wakeup sources (bsc#1051510).\n- power: gemini-poweroff: Avoid spurious poweroff (bsc#1051510).\n- power: supply: act8945a_charger: fix of_irq_get() error check (bsc#1051510).\n- power: supply: cpcap-charger: add OMAP_usb2 dependency (bsc#1051510).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).\n- powerpc/64s: Clear PCR on boot (bnc#1012382).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).\n- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).\n- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).\n- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).\n- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).\n- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).\n- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).\n- pwm: meson: Fix allocation of PWM channel array (bsc#1051510).\n- pwm: meson: Improve PWM calculation precision (bsc#1051510).\n- pwm: stm32: Enforce dependency on CONFIG_MFD_STM32_TIMERS (bsc#1051510).\n- pwm: stm32: Remove unused struct device (bsc#1051510).\n- pwm: tiehrpwm: Fix runtime pm imbalance at unbind (bsc#1051510).\n- pwm: tiehrpwm: fix clock imbalance in probe error path (bsc#1051510).\n- qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Advance drivers\u0027 version to 8.33.0.20 (bsc#1086314).\n- qed*: Advance drivers\u0027 version to 8.33.0.20 (bsc#1086314).\n- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed*: use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add sanity check for SIMD fastpath handler (bsc#1050536).\n- qed: Add sanity check for SIMD fastpath handler (bsc#1050536).\n- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536).\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536).\n- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536).\n- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536).\n- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536).\n- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536).\n- qed: Fix mask for physical address in ILT entry (networking-stable-18_06_08).\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix possible memory leak in Rx error path handling (bsc#1050536).\n- qed: Fix possible memory leak in Rx error path handling (bsc#1050536).\n- qed: Fix possible race for the link state value (bsc#1050536).\n- qed: Fix possible race for the link state value (bsc#1050536).\n- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading stale configuration information (bsc#1086314).\n- qed: Fix reading stale configuration information (bsc#1086314).\n- qed: Fix setting of incorrect eswitch mode (bsc#1050536).\n- qed: Fix setting of incorrect eswitch mode (bsc#1050536).\n- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix use of incorrect size in memcpy call (bsc#1050536).\n- qed: Fix use of incorrect size in memcpy call (bsc#1050536).\n- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536).\n- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Remove unused data member \u0027is_mf_default\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Remove unused data member \u0027is_mf_default\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: fix spelling mistake: \u0027checksumed\u0027 -\u003e \u0027checksummed\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: fix spelling mistake: \u0027checksumed\u0027 -\u003e \u0027checksummed\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: fix spelling mistake: \u0027offloded\u0027 -\u003e \u0027offloaded\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: fix spelling mistake: \u0027offloded\u0027 -\u003e \u0027offloaded\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: fix spelling mistake: \u0027taskelt\u0027 -\u003e \u0027tasklet\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: fix spelling mistake: \u0027taskelt\u0027 -\u003e \u0027tasklet\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538).\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538).\n- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qede: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qedr: Fix spelling mistake: \u0027hanlde\u0027 -\u003e \u0027handle\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qedr: Fix spelling mistake: \u0027hanlde\u0027 -\u003e \u0027handle\u0027 (bsc#1086314 bsc#1086313 bsc#1086301).\n- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301).\n- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301).\n- qlogic: check kstrtoul() for errors (bsc#1050540).\n- qlogic: check kstrtoul() for errors (bsc#1050540).\n- qmi_wwan: add support for Quectel EG91 (bsc#1051510).\n- qmi_wwan: add support for the Dell Wireless 5821e module (bsc#1051510).\n- qmi_wwan: fix interface number for DW5821e production firmware (bsc#1051510).\n- qmi_wwan: set FLAG_SEND_ZLP to avoid network initiated disconnect (bsc#1051510).\n- r8152: fix tx packets accounting (bsc#1051510).\n- r8152: napi hangup fix after disconnect (bsc#1051510).\n- r8169: Be drop monitor friendly (bsc#1051510).\n- rbd: flush rbd_dev-\u003ewatch_dwork after watch is unregistered (bsc#1103216).\n- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306).\n- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306).\n- rdma/cma: Fix use after destroy access to net namespace for IPoib (bsc#1046306).\n- rdma/cma: Fix use after destroy access to net namespace for IPoib (bsc#1046306).\n- rdma/cxgb4: Use structs to describe the uABI instead of opencoding (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- rdma/cxgb4: release hw resources on device removal (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659).\n- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659).\n- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659).\n- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659).\n- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307).\n- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307).\n- rdma/iwpm: fix memory leak on map_info (bsc#1046306).\n- rdma/iwpm: fix memory leak on map_info (bsc#1046306).\n- rdma/mlx4: Discard unknown SQP work requests (bsc#1046302).\n- rdma/mlx4: Discard unknown SQP work requests (bsc#1046302).\n- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305).\n- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305).\n- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305).\n- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305).\n- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305).\n- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305).\n- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305).\n- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305).\n- rdma/mlx5: Protect from shift operand overflow (bsc#1046305).\n- rdma/mlx5: Protect from shift operand overflow (bsc#1046305).\n- rdma/mlx5: Use proper spec flow label type (bsc#1046305).\n- rdma/mlx5: Use proper spec flow label type (bsc#1046305).\n- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301).\n- rdma/ucma: Do not allow setting rdma_OPTION_ib_PATH without an rdma device (bsc#1046306).\n- rdma/ucma: Do not allow setting rdma_OPTION_ib_PATH without an rdma device (bsc#1046306).\n- rdma/ucma: ucma_context reference leak in error path (bsc#1046306).\n- rdma/ucma: ucma_context reference leak in error path (bsc#1046306).\n- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306).\n- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306).\n- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306).\n- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306).\n- regulator: max8998: Fix platform data retrieval (bsc#1051510).\n- regulator: qcom_spmi: Include offset when translating voltages (bsc#1051510).\n- regulator: tps65218: Fix strobe assignment (bsc#1051510).\n- rpm/kernel-source.spec.in: Add more stuff to Recommends ... and move bc to Recommends as well. All these packages are needed for building a kernel manually from scratch with kernel-source files.\n- rpm/kernel-source.spec.in: require bc for kernel-source This is needed for building include/generated/timeconst.h from kernel/time/timeconst.bc.\n- rtc: ac100: Fix ac100 determine rate bug (bsc#1051510).\n- rtc: pxa: fix probe function (bsc#1051510).\n- rtlwifi: Fix kernel Oops \u0027Fw download fail!!\u0027 (bsc#1051510).\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bsc#1051510).\n- rtnetlink: validate attributes in do_setlink() (networking-stable-18_06_08).\n- s390/crc32-vx: use expoline for indirect branches (git-fixes f19fbd5ed6).\n- s390/ftrace: use expoline for indirect branches (git-fixes f19fbd5ed6).\n- s390/gs: add compat regset for the guarded storage broadcast control block (git-fixes e525f8a6e696).\n- s390/kernel: use expoline for indirect branches (git-fixes f19fbd5ed6).\n- s390/lib: use expoline for indirect branches (git-fixes f19fbd5ed6).\n- s390/qdio: do not retry EQBS after CCQ 96 (bsc#1102088, LTC#169699).\n- s390/qeth: fix error handling in adapter command callbacks (bsc#1102088, LTC#169699).\n- s390/qeth: fix race when setting MAC address (bnc#1093148, LTC#167307).\n- s390: Correct register corruption in critical section cleanup (git-fixes 6dd85fbb87).\n- s390: add assembler macros for CPU alternatives (git-fixes f19fbd5ed6).\n- s390: correct module section names for expoline code revert (git-fixes f19fbd5ed6).\n- s390: extend expoline to BC instructions (git-fixes, bsc#1103421).\n- s390: move expoline assembler macros to a header (git-fixes f19fbd5ed6).\n- s390: move spectre sysfs attribute code (bsc#1090098).\n- s390: optimize memset implementation (git-fixes f19fbd5ed6).\n- s390: remove indirect branch from do_softirq_own_stack (git-fixes f19fbd5ed6).\n- s390: use expoline thunks in the BPF JIT (git-fixes, bsc#1103421).\n- sched/core: Optimize ttwu_stat() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/core: Optimize update_stats_*() (bnc#1101669 optimise numa balancing for fast migrate).\n- scripts/dtc: fix \u0027%zx\u0027 warning (bsc#1051510).\n- scripts/gdb/linux/tasks.py: fix get_thread_info (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add \u0027nvme-4.18\u0027 to the list of repositories\n- scripts/git_sort/git_sort.py: add modules-next tree\n- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bsc#1051510).\n- scsi: aacraid: Correct hba_send to include iu_type (bsc#1077989).\n- scsi: core: clean up generated file scsi_devinfo_tbl.c (bsc#1077989).\n- scsi: cxgb4i: silence overflow warning in t4_uld_rx_handler() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- scsi: megaraid_sas: Do not log an error if FW successfully initializes (bsc#1077989).\n- scsi: qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1077989).\n- scsi: qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1077338).\n- scsi: zfcp: fix infinite iteration on ERP ready list (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bsc#1102088, LTC#169699).\n- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bsc#1102088, LTC#169699).\n- sctp: not allow transport timeout value less than HZ/5 for hb_timer (networking-stable-18_06_08).\n- serial: earlycon: Only try fdt when specify \u0027earlycon\u0027 exactly (bsc#1051510).\n- serial: imx: drop if that always evaluates to true (bsc#1051510).\n- serial: pxa: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: sh-sci: Update warning message in sci_request_dma_chan() (bsc#1051510).\n- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bsc#1051510).\n- serial: sirf: Fix out-of-bounds access through DT alias (bsc#1051510).\n- sfc: stop the TX queue before pushing new buffers (bsc#1058169).\n- sfc: stop the TX queue before pushing new buffers (bsc#1058169).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1051510).\n- smsc75xx: fix smsc75xx_set_features() (bsc#1051510).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1051510).\n- socket: close race condition between sock_close() and sockfs_setattr() (networking-stable-18_06_20).\n- spi: bcm-qspi: fIX some error handling paths (bsc#1051510).\n- spi: core: Fix devm_spi_register_master() function name in kerneldoc (bsc#1051510).\n- spi: pxa2xx: Do not touch CS pin until we have a transfer pending (bsc#1051510).\n- spi: sh-msiof: Fix bit field overflow writes to TSCR/RSCR (bsc#1051510).\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bsc#1051510).\n- staging: fbtft: array underflow in fbtft_request_gpios_match() (bsc#1051510).\n- staging: iio: ade7759: fix signed extension bug on shift of a u8 (bsc#1051510).\n- staging: rtl8723bs: Prevent an underflow in rtw_check_beacon_data() (bsc#1051510).\n- staging: rtl8723bs: add missing range check on id (bsc#1051510).\n- staging: rtl8723bs: fix u8 less than zero check (bsc#1051510).\n- staging: rts5208: Fix \u0027seg_no\u0027 calculation in reset_ms_card() (bsc#1051510).\n- staging: sm750fb: Fix parameter mistake in poke32 (bsc#1051510).\n- staging:iio:ade7854: Fix error handling on read/write (bsc#1051510).\n- staging:iio:ade7854: Fix the wrong number of bits to read (bsc#1051510).\n- tcp: verify the checksum of the first data segment in a new connection (networking-stable-18_06_20).\n- team: use netdev_features_t instead of u32 (networking-stable-18_06_08).\n- thermal/drivers/hisi: Fix kernel panic on alarm interrupt (bsc#1051510).\n- thermal/drivers/hisi: Fix missing interrupt enablement (bsc#1051510).\n- thermal/drivers/hisi: Fix multiple alarm interrupts firing (bsc#1051510).\n- thermal/drivers/hisi: Simplify the temperature/step computation (bsc#1051510).\n- thermal: bcm2835: fix an error code in probe() (bsc#1051510).\n- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bsc#1051510).\n- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bsc#1051510).\n- timekeeping: Use proper timekeeper for debug code (bsc#1051510).\n- tools lib traceevent: Fix get_field_str() for dynamic strings (bsc#1051510).\n- tools lib traceevent: Simplify pointer print logic and fix %pF (bsc#1051510).\n- tools/lib/lockdep: Define the ARRAY_SIZE() macro (bsc#1051510).\n- tools/lib/lockdep: Fix undefined symbol prandom_u32 (bsc#1051510).\n- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bsc#1051510).\n- tools/power turbostat: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1051510).\n- tools/thermal: tmon: fix for segfault (bsc#1051510).\n- tools/usbip: fixes build with musl libc toolchain (bsc#1051510).\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bsc#1051510).\n- ubifs: Fix data node size for truncating uncompressed nodes (bsc#1051510).\n- ubifs: Fix potential integer overflow in allocation (bsc#1051510).\n- ubifs: Fix uninitialized variable in search_dh_cookie() (bsc#1051510).\n- ubifs: Fix unlink code wrt. double hash lookups (bsc#1051510).\n- udp: fix rx queue len reported by diag and proc interface (networking-stable-18_06_20).\n- usb-storage: Add compatibility quirk flags for G-Technologies G-Drive (bsc#1051510).\n- usb-storage: Add support for FL_ALWAYS_SYNC flag in the UAS driver (bsc#1051510).\n- usb/gadget: Fix \u0027high bandwidth\u0027 check in usb_gadget_ep_match_desc() (bsc#1051510).\n- usb: Increment wakeup count on remote wakeup (bsc#1051510).\n- usb: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bsc#1087092).\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1051510).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bsc#1051510).\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bsc#1051510).\n- usb: cdc_acm: prevent race at write to acm while system resumes (bsc#1087092).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1051510).\n- usb: do not reset if a low-speed or full-speed device timed out (bsc#1051510).\n- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1051510).\n- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bsc#1051510).\n- usb: dwc2: Improve gadget state disconnection handling (bsc#1085539).\n- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1051510).\n- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1051510).\n- usb: dwc2: hcd: Fix host channel halt flow (bsc#1051510).\n- usb: dwc2: host: Fix transaction errors in host mode (bsc#1051510).\n- usb: dwc3: Add SoftReset PHY synchonization delay (bsc#1051510).\n- usb: dwc3: Fix GDBGFIFOSPACE_TYPE values (bsc#1051510).\n- usb: dwc3: Makefile: fix link error on randconfig (bsc#1051510).\n- usb: dwc3: Undo PHY init if soft reset fails (bsc#1051510).\n- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bsc#1051510).\n- usb: dwc3: ep0: Reset TRB counter for ep0 IN (bsc#1051510).\n- usb: dwc3: gadget: Fix list_del corruption in dwc3_ep_dequeue (bsc#1051510).\n- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bsc#1051510).\n- usb: dwc3: of-simple: fix use-after-free on remove (bsc#1051510).\n- usb: dwc3: omap: do not miss events during suspend/resume (bsc#1051510).\n- usb: dwc3: pci: Properly cleanup resource (bsc#1051510).\n- usb: dwc3: prevent setting PRTCAP to OTG from debugfs (bsc#1051510).\n- usb: gadget: bdc: 64-bit pointer capability check (bsc#1051510).\n- usb: gadget: composite: fix incorrect handling of OS desc requests (bsc#1051510).\n- usb: gadget: core: Fix use-after-free of usb_request (bsc#1051510).\n- usb: gadget: dummy: fix nonsensical comparisons (bsc#1051510).\n- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bsc#1051510).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bsc#1051510).\n- usb: gadget: f_fs: Process all descriptors during bind (bsc#1051510).\n- usb: gadget: f_fs: Use config_ep_by_speed() (bsc#1051510).\n- usb: gadget: f_mass_storage: Fix the logic to iterate all common-\u003eluns (bsc#1051510).\n- usb: gadget: f_midi: fixing a possible double-free in f_midi (bsc#1051510).\n- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bsc#1051510).\n- usb: gadget: f_uac2: fix endianness of \u0027struct cntrl_*_lay3\u0027 (bsc#1051510).\n- usb: gadget: f_uac2: fix error handling in afunc_bind (again) (bsc#1051510).\n- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bsc#1051510).\n- usb: gadget: ffs: Let setup() return usb_GADGET_DELAYED_STATUS (bsc#1051510).\n- usb: gadget: fsl_udc_core: fix ep valid checks (bsc#1051510).\n- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bsc#1051510).\n- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- usb: gadget: udc: core: update usb_ep_queue() documentation (bsc#1051510).\n- usb: gadget: udc: renesas_usb3: disable the controller\u0027s irqs for reconnecting (bsc#1051510).\n- usb: host: ehci: use correct device pointer for dma ops (bsc#1087092).\n- usb: host: xhci-plat: revert \u0027usb: host: xhci-plat: enable clk in resume timing\u0027 (bsc#1051510).\n- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bsc#1051510).\n- usb: musb: Fix external abort in musb_remove on omap2430 (bsc#1051510).\n- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bsc#1051510).\n- usb: musb: fix enumeration after resume (bsc#1051510).\n- usb: musb: fix remote wakeup racing with suspend (bsc#1051510).\n- usb: musb: gadget: misplaced out of bounds check (bsc#1051510).\n- usb: musb: host: fix potential NULL pointer dereference (bsc#1051510).\n- usb: musb: trace: fix NULL pointer dereference in musb_g_tx() (bsc#1051510).\n- usb: option: Add support for FS040U modem (bsc#1087092).\n- usb: quirks: add delay quirks for Corsair Strafe (bsc#1051510).\n- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1051510).\n- usb: serial: cp210x: add CESINEL device ids (bsc#1051510).\n- usb: serial: cp210x: add ELDAT Easywave RX09 id (bsc#1051510).\n- usb: serial: cp210x: add ID for NI usb serial console (bsc#1051510).\n- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bsc#1051510).\n- usb: serial: cp210x: add another usb ID for Qivicon ZigBee stick (bsc#1051510).\n- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bsc#1051510).\n- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bsc#1051510).\n- usb: serial: ftdi_sio: use jtag quirk for Arrow usb Blaster (bsc#1051510).\n- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).\n- usb: serial: mos7840: fix status-register error handling (bsc#1051510).\n- usb: serial: option: Add support for Quectel EP06 (bsc#1051510).\n- usb: serial: option: adding support for ublox R410M (bsc#1051510).\n- usb: serial: option: reimplement interface masking (bsc#1051510).\n- usb: serial: simple: add libtransistor console (bsc#1051510).\n- usb: serial: visor: handle potential invalid device configuration (bsc#1051510).\n- usb: yurex: fix out-of-bounds uaccess in read handler (bsc#1100132).\n- usbip: Correct maximum value of CONFIG_usbIP_VHCI_HC_PORTS (bsc#1051510).\n- usbip: usbip_event: fix to not print kernel pointer address (bsc#1051510).\n- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bsc#1051510).\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bsc#1051510).\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1051510).\n- vfio/pci: Fix potential Spectre v1 (bsc#1051510).\n- vfio/spapr: Use IOMMU pageshift rather than pagesize (bsc#1077761, git-fixes).\n- vhost: synchronize IOTLB message with dev cleanup (networking-stable-18_06_08).\n- video/omap: add module license tags (bsc#1090888).\n- video: remove unused kconfig SH_LCD_MIPI_DSI (bsc#1087092).\n- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bsc#1051510).\n- virtio-net: correctly transmit XDP buff after linearizing (networking-stable-18_06_08).\n- virtio-net: fix leaking page for gso packet during mergeable XDP (networking-stable-18_06_08).\n- virtio-net: fix module unloading (bsc#1051510).\n- virtio_net: Disable interrupts if napi_complete_done rescheduled napi (bsc#1051510).\n- virtio_net: fix XDP code path in receive_small() (bsc#1051510).\n- vmcore: add API to collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- vrf: check the original netdevice for generating redirect (networking-stable-18_06_08).\n- wlcore: add missing nvs file name info for wilink8 (bsc#1051510).\n- x.509: unpack RSA signatureValue field from BIT STRING (bsc#1051510).\n- x86/efi: Access EFI MMIO data as unencrypted when SEV is active (bsc#1099193).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xhci: Fix kernel oops in trace_xhci_free_virt_device (bsc#1100132).\n- xhci: Fix usb3 NULL pointer dereference at logical disconnect (bsc#1090888).\n- xhci: Fix use-after-free in xhci_free_virt_device (bsc#1100132).\n- xhci: revert \u0027xhci: plat: Register shutdown for xhci_plat\u0027 (bsc#1090888).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-1504,SUSE-SLE-Module-Development-Tools-15-2018-1504,SUSE-SLE-Module-Legacy-15-2018-1504,SUSE-SLE-Module-Live-Patching-15-2018-1504,SUSE-SLE-Product-HA-15-2018-1504,SUSE-SLE-Product-WE-15-2018-1504", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2223-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2223-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182223-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2223-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1037697", "url": "https://bugzilla.suse.com/1037697" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046300", "url": "https://bugzilla.suse.com/1046300" }, { "category": "self", "summary": "SUSE Bug 1046302", "url": "https://bugzilla.suse.com/1046302" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1046307", "url": "https://bugzilla.suse.com/1046307" }, { "category": "self", "summary": "SUSE Bug 1046533", "url": "https://bugzilla.suse.com/1046533" }, { "category": "self", "summary": "SUSE Bug 1046543", "url": "https://bugzilla.suse.com/1046543" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050538", "url": "https://bugzilla.suse.com/1050538" }, { "category": "self", "summary": "SUSE Bug 1050540", "url": "https://bugzilla.suse.com/1050540" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054245", "url": "https://bugzilla.suse.com/1054245" }, { "category": "self", "summary": "SUSE Bug 1056651", "url": "https://bugzilla.suse.com/1056651" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1058169", "url": "https://bugzilla.suse.com/1058169" }, { "category": "self", "summary": "SUSE Bug 1058659", "url": "https://bugzilla.suse.com/1058659" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1075087", "url": "https://bugzilla.suse.com/1075087" }, { "category": "self", "summary": "SUSE Bug 1075360", "url": "https://bugzilla.suse.com/1075360" }, { "category": "self", "summary": "SUSE Bug 1077338", "url": "https://bugzilla.suse.com/1077338" }, { "category": "self", "summary": "SUSE Bug 1077761", "url": "https://bugzilla.suse.com/1077761" }, { "category": "self", "summary": "SUSE Bug 1077989", "url": "https://bugzilla.suse.com/1077989" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1085539", "url": "https://bugzilla.suse.com/1085539" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086324", "url": "https://bugzilla.suse.com/1086324" }, { "category": "self", "summary": "SUSE Bug 1086457", "url": "https://bugzilla.suse.com/1086457" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087202", "url": "https://bugzilla.suse.com/1087202" }, { "category": "self", "summary": "SUSE Bug 1087217", "url": "https://bugzilla.suse.com/1087217" }, { "category": "self", "summary": "SUSE Bug 1087233", "url": "https://bugzilla.suse.com/1087233" }, { "category": "self", "summary": "SUSE Bug 1090098", "url": "https://bugzilla.suse.com/1090098" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1093148", "url": "https://bugzilla.suse.com/1093148" }, { "category": "self", "summary": "SUSE Bug 1093666", "url": "https://bugzilla.suse.com/1093666" }, { "category": "self", "summary": "SUSE Bug 1094119", "url": "https://bugzilla.suse.com/1094119" }, { "category": "self", "summary": "SUSE Bug 1096330", "url": "https://bugzilla.suse.com/1096330" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1099193", "url": "https://bugzilla.suse.com/1099193" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100884", "url": "https://bugzilla.suse.com/1100884" }, { "category": "self", "summary": "SUSE Bug 1101143", "url": "https://bugzilla.suse.com/1101143" }, { "category": "self", "summary": "SUSE Bug 1101337", "url": "https://bugzilla.suse.com/1101337" }, { "category": "self", "summary": "SUSE Bug 1101352", "url": "https://bugzilla.suse.com/1101352" }, { "category": "self", "summary": "SUSE Bug 1101564", "url": "https://bugzilla.suse.com/1101564" }, { "category": "self", "summary": "SUSE Bug 1101669", "url": "https://bugzilla.suse.com/1101669" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1101813", "url": "https://bugzilla.suse.com/1101813" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1102088", "url": "https://bugzilla.suse.com/1102088" }, { "category": "self", "summary": "SUSE Bug 1102097", "url": "https://bugzilla.suse.com/1102097" }, { "category": "self", "summary": "SUSE Bug 1102147", "url": "https://bugzilla.suse.com/1102147" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102512", "url": "https://bugzilla.suse.com/1102512" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103216", "url": "https://bugzilla.suse.com/1103216" }, { "category": "self", "summary": "SUSE Bug 1103220", "url": "https://bugzilla.suse.com/1103220" }, { "category": "self", "summary": "SUSE Bug 1103230", "url": "https://bugzilla.suse.com/1103230" }, { "category": "self", "summary": "SUSE Bug 1103421", "url": "https://bugzilla.suse.com/1103421" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-06T17:25:54Z", "generator": { "date": "2018-08-06T17:25:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2223-1", "initial_release_date": "2018-08-06T17:25:54Z", "revision_history": [ { "date": "2018-08-06T17:25:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.6.1.aarch64", "product": { "name": "kernel-default-4.12.14-25.6.1.aarch64", "product_id": "kernel-default-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.6.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-25.6.1.aarch64", "product_id": "kernel-default-devel-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.6.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-25.6.1.aarch64", "product_id": "kernel-obs-build-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.6.1.aarch64", "product": { "name": "kernel-syms-4.12.14-25.6.1.aarch64", "product_id": "kernel-syms-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.6.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-25.6.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.6.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-25.6.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.6.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-25.6.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-25.6.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-25.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-25.6.1.noarch", "product": { "name": "kernel-devel-4.12.14-25.6.1.noarch", "product_id": "kernel-devel-4.12.14-25.6.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-25.6.1.noarch", "product": { "name": "kernel-macros-4.12.14-25.6.1.noarch", "product_id": "kernel-macros-4.12.14-25.6.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-25.6.1.noarch", "product": { "name": "kernel-docs-4.12.14-25.6.1.noarch", "product_id": "kernel-docs-4.12.14-25.6.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-25.6.1.noarch", "product": { "name": "kernel-source-4.12.14-25.6.1.noarch", "product_id": "kernel-source-4.12.14-25.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.6.1.ppc64le", "product": { "name": "kernel-default-4.12.14-25.6.1.ppc64le", "product_id": "kernel-default-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.6.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-25.6.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.6.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-25.6.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.6.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-25.6.1.ppc64le", "product_id": "kernel-syms-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.6.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-25.6.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-25.6.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-25.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.6.1.s390x", "product": { "name": "kernel-default-4.12.14-25.6.1.s390x", "product_id": "kernel-default-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.6.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-25.6.1.s390x", "product_id": "kernel-default-devel-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-25.6.1.s390x", "product": { "name": "kernel-default-man-4.12.14-25.6.1.s390x", "product_id": "kernel-default-man-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-25.6.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-25.6.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.6.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-25.6.1.s390x", "product_id": "kernel-obs-build-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.6.1.s390x", "product": { "name": "kernel-syms-4.12.14-25.6.1.s390x", "product_id": "kernel-syms-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.6.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-25.6.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.6.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.6.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.6.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-25.6.1.s390x", "product_id": "dlm-kmp-default-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.6.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-25.6.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-25.6.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.6.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-25.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-default-4.12.14-25.6.1.x86_64", "product_id": "kernel-default-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-25.6.1.x86_64", "product_id": "kernel-default-devel-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-25.6.1.x86_64", "product_id": "kernel-obs-build-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-syms-4.12.14-25.6.1.x86_64", "product_id": "kernel-syms-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-25.6.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-25.6.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.6.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-25.6.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.6.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-25.6.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-25.6.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-25.6.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-25.6.1.x86_64", "product_id": "kernel-default-extra-4.12.14-25.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64" }, "product_reference": "kernel-default-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-default-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-default-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-25.6.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch" }, "product_reference": "kernel-devel-4.12.14-25.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-25.6.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch" }, "product_reference": "kernel-macros-4.12.14-25.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-25.6.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch" }, "product_reference": "kernel-docs-4.12.14-25.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-25.6.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch" }, "product_reference": "kernel-source-4.12.14-25.6.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-syms-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-25.6.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-25.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:25:54Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.6.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.6.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:25:54Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2019:1425-1
Vulnerability from csaf_suse
Published
2019-06-05 08:33
Modified
2019-06-05 08:33
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_109 fixes one issue.
The following security issue was fixed:
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-2019-1425,SUSE-SLE-SAP-12-SP1-2019-1424,SUSE-SLE-SAP-12-SP2-2019-1425,SUSE-SLE-SERVER-12-2019-1420,SUSE-SLE-SERVER-12-SP1-2019-1424,SUSE-SLE-SERVER-12-SP2-2019-1425
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_109 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1425,SUSE-SLE-SAP-12-SP1-2019-1424,SUSE-SLE-SAP-12-SP2-2019-1425,SUSE-SLE-SERVER-12-2019-1420,SUSE-SLE-SERVER-12-SP1-2019-1424,SUSE-SLE-SERVER-12-SP2-2019-1425", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1425-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1425-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191425-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1425-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005531.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP2)", "tracking": { "current_release_date": "2019-06-05T08:33:57Z", "generator": { "date": "2019-06-05T08:33:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1425-1", "initial_release_date": "2019-06-05T08:33:57Z", "revision_history": [ { "date": "2019-06-05T08:33:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-06-05T08:33:57Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2222-1
Vulnerability from csaf_suse
Published
2018-08-06 17:26
Modified
2018-08-06 17:26
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel-azure was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5390 aka 'SegmentSmack': A remote attacker even with relatively low bandwidth could have caused lots of CPU usage
by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)
- CVE-2017-18344: The timer_create syscall implementation didn't properly validate input,
which could have lead to out-of-bounds access.
This allowed userspace applications to read arbitrary kernel memory in some setups. (bsc#1102851)
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could
have result in local attackers being able to crash the kernel or potentially
elevate privileges because kmalloc_array is not used (bnc#1100418)
- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a
large relative timeout because ktime_add_safe was not used (bnc#1099924)
- CVE-2018-13405: The inode_init_owner function allowed local users to create
files with an unintended group ownership allowing attackers to escalate
privileges by making a plain file executable and SGID (bnc#1100416)
- CVE-2017-5753: Systems with microprocessors utilizing speculative execution
and branch prediction may have allowed unauthorized disclosure of information
to an attacker with local user access via a side-channel analysis (bsc#1068032)
- CVE-2018-1118: Linux kernel vhost did not properly initialize memory in
messages passed between virtual guests and the host operating system. This
could have allowed local privileged users to read some kernel memory contents
when reading from the /dev/vhost-net device file (bsc#1092472)
The following non-security bugs were fixed:
- 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510)
- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15)
- acpi / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510)
- acpi / processor: Finish making acpi_processor_ppc_has_changed() void (bsc#1051510)
- acpi / watchdog: properly initialize resources (bsc#1051510)
- acpi, APEI, EINJ: Subtract any matching Register Region from Trigger resources (bsc#1051510)
- acpi, nfit: Fix scrub idle detection (bsc#1094119)
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1051510)
- acpi: Add helper for deactivating memory region (bsc#1100132)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bsc#1051510)
- alsa: hda - Handle pm failure during hotplug (bsc#1051510)
- alsa: hda/ca0132 - use ARRAY_SIZE (bsc#1051510)
- alsa: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510)
- alsa: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510)
- alsa: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510)
- alsa: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510)
- alsa: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510)
- alsa: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510)
- alsa: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510)
- alsa: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk (bsc#1051510)
- alsa: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510)
- alsa: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510)
- alsa: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510)
- alsa: hda/realtek - Yet another Clevo P950 quirk entry (bsc#1101143)
- alsa: hda/realtek - two more lenovo models need fixup of MIC_LOCATION (bsc#1051510)
- alsa: hda: add mute led support for HP ProBook 455 G5 (bsc#1051510)
- alsa: rawmidi: Change resized buffers atomically (bsc#1051510)
- alsa: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510)
- alsa: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510)
- alx: take rtnl before calling __alx_open from resume (bsc#1051510)
- amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26)
- amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26)
- amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26)
- amd-xgbe: Restore pci interrupt enablement setting on resume (networking-stable-18_03_07)
- arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918)
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1103220)
- arm: amba: Do not read past the end of sysfs 'driver_override' buffer (CVE-2018-9385,bsc#1100491)
- arm: module: fix modsign build error (bsc#1093666)
- arp: fix arp_filter on l3slave devices (networking-stable-18_04_10)
- asoc: cirrus: i2s: Fix LRCLK configuration (bsc#1051510)
- asoc: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510)
- asoc: cs35l35: Add use_single_rw to regmap config (bsc#1051510)
- asoc: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510)
- asoc: mediatek: preallocate pages use platform device (bsc#1051510)
- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1051510)
- atl1c: reserve min skb headroom (bsc#1051510)
- audit: Fix wrong task in comparison of session ID (bsc#1051510)
- audit: ensure that 'audit=1' actually enables audit for PID 1 (bsc#1051510)
- audit: return on memory error to avoid null pointer dereference (bsc#1051510)
- auxdisplay: fix broken menu (bsc#1051510)
- auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510)
- auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510)
- b44: Initialize 64-bit stats seqcount (bsc#1051510)
- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1051510)
- backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510)
- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1051510)
- backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510)
- backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510)
- batman-adv: Accept only filled wifi station info (bsc#1051510)
- batman-adv: Always initialize fragment header priority (bsc#1051510)
- batman-adv: Avoid race in TT TVLV allocator helper (bsc#1051510)
- batman-adv: Avoid storing non-TT-sync flags on singular entries too (bsc#1051510)
- batman-adv: Fix TT sync flags for intermediate TT responses (bsc#1051510)
- batman-adv: Fix bat_ogm_iv best gw refcnt after netlink dump (bsc#1051510)
- batman-adv: Fix bat_v best gw refcnt after netlink dump (bsc#1051510)
- batman-adv: Fix check of retrieved orig_gw in batadv_v_gw_is_eligible (bsc#1051510)
- batman-adv: Fix debugfs path for renamed hardif (bsc#1051510)
- batman-adv: Fix debugfs path for renamed softif (bsc#1051510)
- batman-adv: Fix internal interface indices types (bsc#1051510)
- batman-adv: Fix lock for ogm cnt access in batadv_iv_ogm_calc_tq (bsc#1051510)
- batman-adv: Fix multicast packet loss with a single WANT_ALL_IPV4/6 flag (bsc#1051510)
- batman-adv: Fix netlink dumping of BLA backbones (bsc#1051510)
- batman-adv: Fix netlink dumping of BLA claims (bsc#1051510)
- batman-adv: Fix skbuff rcsum on packet reroute (bsc#1051510)
- batman-adv: Ignore invalid batadv_iv_gw during netlink send (bsc#1051510)
- batman-adv: Ignore invalid batadv_v_gw during netlink send (bsc#1051510)
- batman-adv: Use default throughput value on cfg80211 error (bsc#1051510)
- batman-adv: fix TT sync flag inconsistencies (bsc#1051510)
- batman-adv: fix header size check in batadv_dbg_arp() (bsc#1051510)
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bsc#1051510)
- batman-adv: fix packet checksum in receive path (bsc#1051510)
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bsc#1051510)
- batman-adv: invalidate checksum on fragment reassembly (bsc#1051510)
- batman-adv: update data pointers after skb_cow() (bsc#1051510)
- bfq: Re-enable auto-loading when built as a module (bsc#1099918)
- blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918)
- blk-mq: count allocated but not started requests in iostats inflight (bsc#1077989)
- blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918)
- blk-mq: fix sysfs inflight counter (bsc#1077989)
- blk-mq: make sure hctx->next_cpu is set correctly (bsc#1099918)
- blk-mq: make sure that correct hctx->next_cpu is set (bsc#1099918)
- blk-mq: reinit q->tag_set_list entry only after grace period (bsc#1099918)
- blk-mq: simplify queue mapping; schedule with each possisble CPU (bsc#1099918)
- block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918)
- block, bfq: fix occurrences of request finish method's old name (bsc#1099918)
- block/swim: Remove extra put_disk() call from error path (bsc#1099918)
- block: Fix __bio_integrity_endio() documentation (bsc#1099918)
- block: Fix cloning of requests with a special payload (bsc#1099918)
- block: always set partition number to '0' in blk_partition_remap() (bsc#1054245)
- block: always set partition number to '0' in blk_partition_remap() (bsc#1077989)
- block: bio_check_eod() needs to consider partitions (bsc#1077989)
- block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918)
- block: factor out __blkdev_issue_zero_pages() (bsc#1099918)
- block: fail op_is_write() requests to read-only partitions (bsc#1077989)
- block: pass 'run_queue' to blk_mq_request_bypass_insert (bsc#1077989)
- block: sed-opal: Fix a couple off by one bugs (bsc#1099918)
- block: set request_list for request (bsc#1077989)
- bluetooth: avoid recursive locking in hci_send_to_channel() (bsc#1051510)
- bluetooth: hci_ll: Add support for the external clock (bsc#1051510)
- bluetooth: hci_ll: Fix download_firmware() return when __hci_cmd_sync fails (bsc#1051510)
- bluetooth: hci_nokia: select BT_HCIUART_H4 (bsc#1051510)
- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510)
- bluetooth: hci_uart: fix kconfig dependency (bsc#1051510)
- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323)
- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323)
- bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323)
- bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323)
- bnx2x: Use NETIF_F_GRO_HW (bsc#1086323)
- bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323)
- bnx2x: fix slowpath null crash (bsc#1086323)
- bnx2x: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086323)
- bnx2x: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086323)
- bnx2x: use the right constant (bsc#1086323)
- bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282)
- bnxt_en: Add IRQ remapping logic (bsc#1086282)
- bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282)
- bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282)
- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282)
- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282)
- bnxt_en: Add extended port statistics support (bsc#1086282)
- bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282)
- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282)
- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282)
- bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282)
- bnxt_en: Always forward VF MAC address to the PF (bsc#1086282)
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242)
- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242)
- bnxt_en: Change IRQ assignment for rdma driver (bsc#1086282)
- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282)
- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282)
- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282)
- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282)
- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282)
- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282)
- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282)
- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282)
- bnxt_en: Do not allow VF to read EEPROM (bsc#1086282)
- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242)
- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242)
- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282)
- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282)
- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282)
- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282)
- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282)
- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282)
- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282)
- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282)
- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282)
- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282)
- bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282)
- bnxt_en: Fix firmware message delay loop regression (bsc#1086282)
- bnxt_en: Fix for system hang if request_irq fails (bsc#1050242)
- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242)
- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282)
- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282)
- bnxt_en: Fix the vlan_tci exact match check (bsc#1050242)
- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282)
- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282)
- bnxt_en: Forward VF MAC address to the PF (bsc#1086282)
- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282)
- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282)
- bnxt_en: Implement new method to reserve rings (bsc#1086282)
- bnxt_en: Improve resource accounting for SRIOV (bsc#1086282)
- bnxt_en: Improve ring allocation logic (bsc#1086282)
- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282)
- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282)
- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282)
- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282)
- bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282)
- bnxt_en: Need to include rdma rings in bnxt_check_rings() (bsc#1086282)
- bnxt_en: Need to include rdma rings in bnxt_check_rings() (bsc#1086282)
- bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282)
- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282)
- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282)
- bnxt_en: Refactor bnxt_close_nic() (bsc#1086282)
- bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282)
- bnxt_en: Refactor hardware resource data structures (bsc#1086282)
- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282)
- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282)
- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282)
- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282)
- bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282)
- bnxt_en: Reserve completion rings and MSIX for bnxt_re rdma driver (bsc#1086282)
- bnxt_en: Reserve completion rings and MSIX for bnxt_re rdma driver (bsc#1086282)
- bnxt_en: Reserve resources for RFS (bsc#1086282)
- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282)
- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282)
- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282)
- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282)
- bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282)
- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282)
- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282)
- bnxt_en: Simplify ring alloc/free error messages (bsc#1086282)
- bnxt_en: Support max-mtu with VF-reps (bsc#1086282)
- bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282)
- bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282)
- bnxt_en: Use a dedicated VNIC mode for rdma (bsc#1086282)
- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282)
- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282)
- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282)
- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282)
- bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282)
- bonding: do not allow rlb updates to invalid mac (networking-stable-18_05_15)
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26)
- bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10)
- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10)
- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10)
- bonding: re-evaluate force_primary when the primary slave name changes (networking-stable-18_06_20)
- bonding: send learning packets for vlans on slave (networking-stable-18_05_15)
- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282)
- bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15)
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457)
- btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918)
- bus: arm-cci: Fix use of smp_processor_id() in preemptible context (bsc#1051510)
- bus: arm-ccn: Check memory allocation failure (bsc#1051510)
- bus: arm-ccn: Fix use of smp_processor_id() in preemptible context (bsc#1051510)
- bus: arm-ccn: fix module unloading Error: Removing state 147 which has instances left (bsc#1051510)
- can: bcm: check for null sk before deferencing it via the call to sock_net (bsc#1051510)
- can: hi311x: Acquire SPI lock on ->do_get_berr_counter (bsc#1051510)
- can: hi311x: Work around TX complete interrupt erratum (bsc#1051510)
- can: m_can.c: fix setup of CCCR register: clear CCCR NISO bit before checking can.ctrlmode (bsc#1051510)
- can: mpc5xxx_can: check of_iomap return before use (bsc#1051510)
- can: peak_canfd: fix firmware: limit allocation to 32-bit DMA addr only (bsc#1051510)
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bsc#1051510)
- can: xilinx_can: fix RX overflow interrupt not being enabled (bsc#1051510)
- can: xilinx_can: fix device dropping off bus on RX overrun (bsc#1051510)
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bsc#1051510)
- can: xilinx_can: fix power management handling (bsc#1051510)
- can: xilinx_can: fix recovery from error states not being propagated (bsc#1051510)
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bsc#1051510)
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13)
- cdc_ncm: avoid padding beyond end of skb (networking-stable-18_06_20)
- ceph: fix dentry leak in splice_dentry() (bsc#1098236)
- cfg80211: initialize sinfo in cfg80211_get_station (bsc#1051510)
- checkpatch: add 6 missing types to --list-types (bsc#1051510)
- cifs: Check for timeout on Negotiate stage (bsc#1091171)
- cifs: Fix infinite loop when using hard mount option (bsc#1091171)
- cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097)
- clk: Do not show the incorrect clock phase (bsc#1051510)
- clk: Do not write error code into divider register (bsc#1051510)
- clk: Fix __set_clk_rates error print-string (bsc#1051510)
- clk: at91: PLL recalc_rate() now using cached MUL and DIV values (bsc#1051510)
- clk: at91: fix clk-generated parenting (bsc#1051510)
- clk: axi-clkgen: Correctly handle nocount bit in recalc_rate() (bsc#1051510)
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bsc#1051510)
- clk: fix false-positive Wmaybe-uninitialized warning (bsc#1051510)
- clk: fix mux clock documentation (bsc#1051510)
- clk: fix set_rate_range when current rate is out of range (bsc#1051510)
- clk: hi3660: fix incorrect uart3 clock freqency (bsc#1051510)
- clk: hi6220: change watchdog clock source (bsc#1051510)
- clk: hi6220: mark clock cs_atb_syspll as critical (bsc#1051510)
- clk: hisilicon: fix potential NULL dereference in hisi_clk_alloc() (bsc#1051510)
- clk: hisilicon: mark wdt_mux_p[] as const (bsc#1051510)
- clk: honor CLK_MUX_ROUND_CLOSEST in generic clk mux (bsc#1051510)
- clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bsc#1051510)
- clk: imx7d: fix mipi dphy div parent (bsc#1051510)
- clk: mediatek: add the option for determining PLL source clock (bsc#1051510)
- clk: mediatek: mark mtk_infrasys_init_early __init (bsc#1051510)
- clk: meson: gxbb: fix clk_mclk_i958 divider flags (bsc#1051510)
- clk: meson: gxbb: fix meson cts_amclk divider flags (bsc#1051510)
- clk: meson: gxbb: fix wrong clock for SARADC/SANA (bsc#1051510)
- clk: meson: meson8b: fix protection against undefined clks (bsc#1051510)
- clk: meson: mpll: fix mpll0 fractional part ignored (bsc#1051510)
- clk: meson: mpll: use 64-bit maths in params_from_rate (bsc#1051510)
- clk: meson: remove unnecessary rounding in the pll clock (bsc#1051510)
- clk: mvebu: use correct bit for 98DX3236 NAND (bsc#1051510)
- clk: qcom: Base rcg parent rate off plan frequency (bsc#1051510)
- clk: qcom: clk-smd-rpm: Fix the reported rate of branches (bsc#1051510)
- clk: qcom: common: fix legacy board-clock registration (bsc#1051510)
- clk: qcom: msm8916: Fix bimc gpu clock ops (bsc#1051510)
- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bsc#1051510)
- clk: renesas: div6: Document fields used for parent selection (bsc#1051510)
- clk: renesas: r8a7745: Remove PLL configs for MD19=0 (bsc#1051510)
- clk: renesas: r8a7745: Remove nonexisting scu-src[0789] clocks (bsc#1051510)
- clk: renesas: r8a7795: Correct pwm, gpio, and i2c parent clocks on ES2.0 (bsc#1051510)
- clk: renesas: rcar-gen2: Fix PLL0 on R-Car V2H and E2 (bsc#1051510)
- clk: rockchip: Fix wrong parent for SDMMC phase clock for rk3228 (bsc#1051510)
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bsc#1051510)
- clk: samsung: Fix m2m scaler clock on Exynos542x (bsc#1051510)
- clk: samsung: exynos3250: Fix PLL rates (bsc#1051510)
- clk: samsung: exynos5250: Add missing clocks for FIMC LITE SYSMMU devices (bsc#1051510)
- clk: samsung: exynos5250: Fix PLL rates (bsc#1051510)
- clk: samsung: exynos5260: Fix PLL rates (bsc#1051510)
- clk: samsung: exynos5433: Fix PLL rates (bsc#1051510)
- clk: samsung: exynos7: Fix PLL rates (bsc#1051510)
- clk: samsung: s3c2410: Fix PLL rates (bsc#1051510)
- clk: scpi: error when clock fails to register (bsc#1051510)
- clk: scpi: fix return type of __scpi_dvfs_round_rate (bsc#1051510)
- clk: si5351: Rename internal plls to avoid name collisions (bsc#1051510)
- clk: si5351: fix PLL reset (bsc#1051510)
- clk: socfpga: Fix the smplsel on Arria10 and Stratix10 (bsc#1051510)
- clk: sunxi-ng: Fix fractional mode for N-M clocks (bsc#1051510)
- clk: sunxi-ng: Make fractional helper less chatty (bsc#1051510)
- clk: sunxi-ng: Wait for lock when using fractional mode (bsc#1051510)
- clk: sunxi-ng: a31: Fix CLK_OUT_* clock ops (bsc#1051510)
- clk: sunxi-ng: add CLK_SET_RATE_PARENT flag to H3 GPU clock (bsc#1051510)
- clk: sunxi-ng: add CLK_SET_RATE_UNGATE to all H3 PLLs (bsc#1051510)
- clk: sunxi-ng: allow set parent clock (PLL_CPUX) for CPUX clock on H3 (bsc#1051510)
- clk: sunxi-ng: h3: gate then ungate PLL CPU clk after rate change (bsc#1051510)
- clk: sunxi-ng: multiplier: Fix fractional mode (bsc#1051510)
- clk: sunxi-ng: nm: Check if requested rate is supported by fractional clock (bsc#1051510)
- clk: sunxi-ng: sun5i: Fix bit offset of audio PLL post-divider (bsc#1051510)
- clk: sunxi-ng: sun6i: Export video PLLs (bsc#1051510)
- clk: sunxi-ng: sun6i: Rename HDMI DDC clock to avoid name collision (bsc#1051510)
- clk: sunxi: fix build warning (bsc#1051510)
- clk: sunxi: fix uninitialized access (bsc#1051510)
- clk: tegra: Fix cclk_lp divisor register (bsc#1051510)
- clk: tegra: Fix pll_u rate configuration (bsc#1051510)
- clk: tegra: Use readl_relaxed_poll_timeout_atomic() in tegra210_clock_init() (bsc#1051510)
- clk: ti: dra7-atl-clock: fix child-node lookups (bsc#1051510)
- clk: uniphier: fix DAPLL2 clock rate of Pro5 (bsc#1051510)
- clk: x86: Do not gate clocks enabled by the firmware (bsc#1051510)
- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bsc#1051510)
- clocksource/drivers/stm32: Fix kernel panic with multiple timers (bsc#1051510)
- cnic: Fix an error handling path in 'cnic_alloc_bnx2x_resc()' (bsc#1086324)
- cnic: Fix an error handling path in 'cnic_alloc_bnx2x_resc()' (bsc#1086324)
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bsc#1100884)
- cpufreq: Fix new policy initialization during limits updates via sysfs (bsc#1100884)
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bsc#1100884)
- cpufreq: docs: Add missing cpuinfo_cur_freq description (bsc#1051510)
- cpufreq: docs: Drop intel-pstate.txt from index.txt (bsc#1051510)
- cpufreq: governors: Fix long idle detection logic in load calculation (bsc#1100884)
- cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110)
- cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510)
- cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110)
- cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110)
- cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110)
- cpufreq: powernv: Fix hardlockup due to synchronous smp_call in timer interrupt (bsc#1100884)
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bsc#1100884)
- crash_dump: is_kdump_kernel can be boolean (bsc#1103230)
- crypto: caam/qi - explicitly set dma_ops (bsc#1051510)
- crypto: ccp - remove unused variable qim (bsc#1051510)
- crypto: change transient busy return code to -ENOSPC (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Add authenc versions of ctr and sha (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Check error code with IS_ERR macro (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Fix IV updated in XTS operation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Fix Indentation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Fix an error code in chcr_hash_dma_map() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Fix indentation warning (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Fix iv passed in fallback path for rfc3686 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Fix src buffer dma length (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Make function aead_ccm_validate_input static (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Remove allocation of sg list to implement 2K limit of dsgl header (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Remove dst sg size zero check (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Remove unused parameter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Update IV before sending request to HW (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Use kernel round function to align lengths (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - Use x8_ble gf multiplication to calculate IV (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - check for sg null (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: chelsio - do not leak pointers to authenc keys (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bsc#1051510)
- crypto: crypto4xx - remove bad list_del (bsc#1051510)
- crypto: gf128mul - The x8_ble multiplication functions (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- crypto: sha512-mb - add some missing unlock on error (bsc#1051510)
- cxgb4/cxgb4vf: Notify link changes to OS-dependent code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4/cxgb4vf: add support for ndo_set_vf_vlan (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4/cxgb4vf: check fw caps to set link mode mask (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4/cxgb4vf: link management changes for new SFP (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add FORCE_PAUSE bit to 32 bit port caps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add HMA support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add TP Congestion map entry for single-port (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add new T5 device id (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add new T6 device ids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add support for ethtool i2c dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add support to initialise/read SRQ entries (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Add support to query HW SRQ parameters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Adds CPL support for Shared Receive Queues (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Check alignment constraint for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Check for kvzalloc allocation failure (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Fix error handling path in 'init_one()' (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Fix queue free path of ULD drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Fix {vxlan/geneve}_port initialization (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: IPv6 filter takes 2 tids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Setup FW queues before registering netdev (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Support firmware rdma write completion work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: Support firmware rdma write with immediate work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: add new T5 device id's (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: avoid schedule while atomic (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: change the port capability bits definition (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: clean up init_one (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: collect SGE PF/VF queue map (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: copy adap index to PF0-3 adapter instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: copy mbox log size to PF0-3 adap instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: copy the length of cpl_tx_pkt_core to fw_wr (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: copy vlan_id in ndo_get_vf_config (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: depend on firmware event for link status (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: do L1 config when module is inserted (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: do not display 50Gbps as unsupported speed (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: do not fail vf instatiation in slave mode (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: do not set needs_free_netdev for mgmt dev's (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: enable ZLIB_DEFLATE when building cxgb4 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: enable inner header checksum calculation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: fix the wrong conversion of Mbps to Kbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: free up resources of pf 0-3 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: increase max tx rate limit to 100 Gbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: notify fatal error to uld drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: remove dead code when allocating filter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: restructure VF mgmt code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: rework on-chip memory read (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: support new ISSI flash parts (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: update LE-TCAM collection for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: update dump collection logic to use compression (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: use CLIP with LIP6 on T6 for TCAM filters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: use zlib deflate to compress firmware dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4: zero the HMA memory (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4vf: Forcefully link up virtual interfaces (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgb4vf: display pause settings (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- cxgbit: call neigh_event_send() to update MAC address (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315)
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (networking-stable-18_06_08)
- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28)
- dccp: fix tasklet usage (networking-stable-18_05_15)
- dell_rbu: make firmware payload memory uncachable (bsc#1087978)
- device property: Allow iterating over available child fwnodes (bsc#1098633)
- device property: Introduce fwnode_call_bool_op() for ops that return bool (bsc#1098633)
- device property: Introduce fwnode_device_is_available() (bsc#1098633)
- device property: Introduce fwnode_get_mac_address() (bsc#1098633)
- device property: Introduce fwnode_get_phy_mode() (bsc#1098633)
- device property: Introduce fwnode_irq_get() (bsc#1098633)
- device property: Move FW type specific functionality to FW specific files (bsc#1098633)
- device property: Move fwnode graph ops to firmware specific locations (bsc#1098633)
- device property: preserve usecount for node passed to of_fwnode_graph_get_port_parent() (bsc#1098633)
- device: Fix kABI breakage for of/device change (bsc#1051510)
- devlink: Remove redundant free on error path (networking-stable-18_03_28)
- dm integrity: use kvfree for kvmalloc'd memory (bsc#1099918)
- dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918)
- dm raid: do not use 'const' in function return (bsc#1099918)
- dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918)
- dm: convert DM printk macros (bsc#1099918)
- dm: fix printk() rate limiting code (bsc#1099918)
- dm: use bio_split() when splitting out the already processed bio (bsc#1099918)
- dmaengine: fsl-edma: disable clks on all error paths (bsc#1051510)
- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bsc#1051510)
- dmaengine: mv_xor_v2: Fix clock resource by adding a register clock (bsc#1051510)
- dmaengine: omap-dma: port_window support correction for both direction (bsc#1051510)
- dmaengine: pl330: fix a race condition in case of threaded irqs (bsc#1051510)
- dmaengine: pl330: report BURST residue granularity (bsc#1051510)
- dmaengine: qcom: bam_dma: get num-channels and num-ees from dt (bsc#1051510)
- dmaengine: qcom_hidma: check pending interrupts (bsc#1051510)
- dmaengine: rcar-dmac: Check the done lists in rcar_dmac_chan_get_residue() (bsc#1051510)
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bsc#1051510)
- dmaengine: tegra-apb: Really fix runtime-pm usage (bsc#1051510)
- dmaengine: tegra210-adma: fix of_irq_get() error check (bsc#1051510)
- dmaengine: xilinx_dma: Fix error code format specifier (bsc#1051510)
- dmaengine: zynqmp_dma: Fix race condition in the probe (bsc#1051510)
- doc: Rename .system_keyring to .builtin_trusted_keys (bsc#1051510)
- doc: SKB_GSO_[IPIP|SIT] have been replaced (bsc#1051510)
- docs-rst: fix broken links to dynamic-debug-howto in kernel-parameters (bsc#1051510)
- docs: segmentation-offloads.txt: Fix ref to SKB_GSO_TUNNEL_REMCSUM (bsc#1051510)
- documentation: admin-guide: intel_pstate: Fix sysfs path (bsc#1051510)
- dp83640: Ensure against premature access to PHY registers after reset (bsc#1051510)
- dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28)
- dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28)
- dpaa_eth: remove duplicate initialization (networking-stable-18_03_28)
- drbd: Fix drbd_request_prepare() discard handling (bsc#1099918)
- drbd: fix access after free (bsc#1051510)
- driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510)
- driver core: Fix link to device power management documentation (bsc#1051510)
- driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918)
- driver core: Partially revert 'driver core: correct device's shutdown order' (bsc#1051510)
- drivers/firmware: psci_checker: Add missing destroy_timer_on_stack() (bsc#1051510)
- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301)
- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301)
- drivers: Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035)
- drivers: net: bnx2x: use setup_timer() helper (bsc#1086323)
- drivers: net: i40evf: use setup_timer() helper (bsc#1101816)
- drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510)
- drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510)
- drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510)
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510)
- drm/bridge/sii8620: fix potential buffer overflow (bsc#1051510)
- drm/exynos: Fix dma-buf import (bsc#1051510)
- drm/i915/dp: Send DPCD ON for MST before phy_up (bsc#1051510)
- drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510)
- drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510)
- drm/i915: Apply batch location restrictions before pinning (bsc#1051510)
- drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510)
- drm/i915: Fix context ban and hang accounting for client (bsc#1051510)
- drm/i915: Fix hotplug irq ack on i965/g4x (bsc#1051510)
- drm/i915: Only call tasklet_kill() on the first prepare_reset (bsc#1051510)
- drm/i915: Remove unbannable context spam from reset (bsc#1051510)
- drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510)
- drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209)
- drm/nouveau/drm/nouveau: Fix runtime PM leak in nv50_disp_atomic_commit() (bsc#1090888)
- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1051510)
- drm/nouveau: Avoid looping through fake MST connectors (bsc#1051510)
- drm/nouveau: Use drm_connector_list_iter_* for iterating connectors (bsc#1051510)
- drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510)
- drm/rockchip: Fix build warning in analogix_dp-rockchip.c (bsc#1085536)
- drm/rockchip: analogix_dp: Remove unnecessary init code (bsc#1085536)
- drm/rockchip: dw_hdmi: Move HDMI vpll clock enable to bind() (bsc#1087092)
- drm/rockchip: inno_hdmi: Fix error handling path (bsc#1087092)
- drm/rockchip: inno_hdmi: reorder clk_disable_unprepare call in unbind (bsc#1087092)
- drm/tegra: Acquire a reference to the IOVA cache (bsc#1090888)
- drm/udl: fix display corruption of the last line (bsc#1101337)
- drm: Use kvzalloc for allocating blob property memory (bsc#1101352)
- drm: mali-dp: Uninitialized variable in malidp_se_check_scaling() (bsc#1087092)
- drm: rcar-du: Remove zpos field from rcar_du_vsp_plane_state structure (bsc#1085539)
- drm: rcar-du: lvds: Fix LVDCR1 for R-Car gen3 (bsc#1085539)
- dvb_frontend: do not use-after-free the frontend struct (bsc#1051510)
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876)
- earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918)
- efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps() (bsc#1051510)
- enic: do not overwrite error code (bsc#1037697)
- enic: enable rq before updating rq descriptors (bsc#1037697)
- enic: set DMA mask to 47 bit (networking-stable-18_06_08)
- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282)
- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282)
- ethtool: add ethtool_intersect_link_masks (bsc#1101816)
- f2fs: fix to wake up all sleeping flusher (bsc#1099918)
- fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07)
- firewire: net: max MTU off by one (bsc#1051510)
- firmware: arm_scpi: fix endianness of dev_id in struct dev_pstate_set (bsc#1051510)
- firmware: dmi: Optimize dmi_matches (bsc#1051510)
- firmware: tegra: Fix locking bugs in BPMP (bsc#1051510)
- fix Patch-mainline header
- fix kabi due to perf_event.h uapi field change
- flow_dissector: properly cap thoff field (networking-stable-18_01_28)
- fm10k: Fix configuration for macvlan offload (bsc#1101813)
- fm10k: Fix misuse of net_ratelimit() (bsc#1101813)
- fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813)
- fm10k: add missing fall through comment (bsc#1101813)
- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813)
- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813)
- fm10k: avoid needless delay when loading driver (bsc#1101813)
- fm10k: avoid possible truncation of q_vector->name (bsc#1101813)
- fm10k: bump version number (bsc#1101813)
- fm10k: clarify action when updating the VLAN table (bsc#1101813)
- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813)
- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813)
- fm10k: correct typo in fm10k_pf.c (bsc#1101813)
- fm10k: do not assume VLAN 1 is enabled (bsc#1101813)
- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813)
- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813)
- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813)
- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813)
- fm10k: fix 'failed to kill vid' message for VF (bsc#1101813)
- fm10k: fix function doxygen comments (bsc#1101813)
- fm10k: fix incorrect warning for function prototype (bsc#1101813)
- fm10k: fix typos on fall through comments (bsc#1101813)
- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813)
- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813)
- fm10k: mark PM functions as __maybe_unused (bsc#1101813)
- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813)
- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813)
- fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813)
- fm10k: prepare_for_reset() when we lose pcie Link (bsc#1101813)
- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813)
- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813)
- fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813)
- fm10k: reschedule service event if we stall the PF-SM mailbox (bsc#1101813)
- fm10k: reschedule service event if we stall the PF-SM mailbox (bsc#1101813)
- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813)
- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813)
- fm10k: simplify reading PFVFLRE register (bsc#1101813)
- fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813)
- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813)
- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813)
- fm10k: use generic PM hooks instead of legacy pcie power hooks (bsc#1101813)
- fm10k: use generic PM hooks instead of legacy pcie power hooks (bsc#1101813)
- fm10k: use macro to avoid passing the array and size separately (bsc#1101813)
- fm10k: use macro to avoid passing the array and size separately (bsc#1101813)
- fm10k: use spinlock to implement mailbox lock (bsc#1101813)
- fm10k: use the MAC/VLAN queue for VF-PF MAC/VLAN requests (bsc#1101813)
- fm10k: use the MAC/VLAN queue for VF-PF MAC/VLAN requests (bsc#1101813)
- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813)
- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813)
- fm10k: warn if the stat size is unknown (bsc#1101813)
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142)
- fsi: core: register with postcore_initcall (bsc#1051510)
- ftrace: Fix selftest goto location on error (bsc#1099918)
- fuse: Remove the buggy retranslation of pids in fuse_dev_do_read (bsc#1051510)
- fuse: atomic_o_trunc should truncate pagecache (bsc#1051510)
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bsc#1051510)
- fuse: fix congested state leak on aborted connections (bsc#1051510)
- fuse: fix control dir setup and teardown (bsc#1051510)
- gpio: acpi: work around false-positive -Wstring-overflow warning (bsc#1051510)
- gpio: brcmstb: allow all instances to be wakeup sources (bsc#1051510)
- gpio: brcmstb: check return value of gpiochip_irqchip_add() (bsc#1051510)
- gpio: brcmstb: correct the configuration of level interrupts (bsc#1051510)
- gpio: brcmstb: release the bgpio lock during irq handlers (bsc#1051510)
- gpio: brcmstb: switch to handle_level_irq flow (bsc#1051510)
- gpio: pca953x: fix vendor prefix for PCA9654 (bsc#1051510)
- gpio: reject invalid gpio before getting gpio_desc (bsc#1051510)
- gpio: tegra: fix unbalanced chained_irq_enter/exit (bsc#1051510)
- gpu: host1x: Acquire a reference to the IOVA cache (bsc#1090888)
- hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07)
- hid: add backlight level quirk for Asus ROG laptops (bsc#1101324)
- hid: debug: check length before copy_to_user() (bsc#1051510)
- hid: hiddev: fix potential Spectre v1 (bsc#1051510)
- hid: i2c-hid: Fix 'incomplete report' noise (bsc#1051510)
- hid: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510)
- hid: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510)
- hid: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510)
- hid: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633)
- hid: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510)
- hid: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510)
- hid: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510)
- hwmon: (aspeed-pwm) add THERMAL dependency (bsc#1051510)
- hwmon: (ftsteutates) Fix clearing alarm sysfs entries (bsc#1051510)
- hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510)
- hwmon: (ltc2990) Fix incorrect conversion of negative temperatures (bsc#1051510)
- hwmon: (nct6683) Enable EC access if disabled at boot (bsc#1051510)
- hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510)
- hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510)
- hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510)
- hwmon: (stts751) buffer overrun on wrong chip configuration (bsc#1051510)
- hwmon: (tmp102) Fix first temperature reading (bsc#1051510)
- hwmon: Deal with errors from the thermal subsystem (bsc#1051510)
- hwrng: stm32 - add reset during probe (bsc#1051510)
- hwtracing: stm: fix build error on some arches (bsc#1051510)
- i2c: axxia: enable clock before calling clk_get_rate() (bsc#1051510)
- i2c: designware: Round down acpi provided clk to nearest supported clk (bsc#1051510)
- i2c: mux: pinctrl: mention correct module name in Kconfig help text (bsc#1051510)
- i2c: pmcmsp: fix error return from master_xfer (bsc#1051510)
- i2c: pmcmsp: return message count on master_xfer success (bsc#1051510)
- i2c: tegra: Fix NACK error handling (bsc#1051510)
- i2c: viperboard: return message count on master_xfer success (bsc#1051510)
- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816)
- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816)
- i40e/i40evf: Bump driver versions (bsc#1101816)
- i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816)
- i40e/i40evf: Clean-up of bits related to using q_vector->reg_idx (bsc#1101816)
- i40e/i40evf: Clean-up of bits related to using q_vector->reg_idx (bsc#1101816)
- i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816)
- i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816)
- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816)
- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816)
- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816)
- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816)
- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816)
- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816)
- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816)
- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816)
- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816)
- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816)
- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816)
- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816)
- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816)
- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816)
- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816)
- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816)
- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816)
- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816)
- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816)
- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816)
- i40e/i40evf: do not trust VF to reset itself (bsc#1101816)
- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816)
- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816)
- i40e/i40evf: organize and re-number feature flags (bsc#1101816)
- i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816)
- i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816)
- i40e/i40evf: use SW variables for hang detection (bsc#1101816)
- i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816)
- i40e: Add advertising 10G LR mode (bsc#1101816)
- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816)
- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816)
- i40e: Add infrastructure for queue channel support (bsc#1101816)
- i40e: Add macro for PF reset bit (bsc#1101816)
- i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816)
- i40e: Add returning AQ critical error to SW (bsc#1101816)
- i40e: Add support for 'ethtool -m' (bsc#1101816)
- i40e: Cleanup i40e_vlan_rx_register (bsc#1101816)
- i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821)
- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816)
- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816)
- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816)
- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816)
- i40e: Display error message if module does not meet thermal requirements (bsc#1101816)
- i40e: Display error message if module does not meet thermal requirements (bsc#1101816)
- i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978)
- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816)
- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816)
- i40e: Fix FLR reset timeout issue (bsc#1101816)
- i40e: Fix a potential NULL pointer dereference (bsc#1101816)
- i40e: Fix for NUP NVM image downgrade failure (bsc#1101816)
- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816)
- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816)
- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816)
- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816)
- i40e: Fix kdump failure (bsc#1101816)
- i40e: Fix link down message when interface is brought up (bsc#1101816)
- i40e: Fix link down message when interface is brought up (bsc#1101816)
- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816)
- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816)
- i40e: Fix permission check for VF MAC filters (bsc#1101816)
- i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816)
- i40e: Fix reporting of supported link modes (bsc#1101816)
- i40e: Fix the number of queues available to be mapped for use (bsc#1094978)
- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816)
- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816)
- i40e: Fix unqualified module message while bringing link up (bsc#1101816)
- i40e: Fix unqualified module message while bringing link up (bsc#1101816)
- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816)
- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816)
- i40e: Prevent setting link speed on KX_X722 (bsc#1101816)
- i40e: Properly maintain flow director filters list (bsc#1101816)
- i40e: Remove limit of 64 max queues per channel (bsc#1101816)
- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816)
- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816)
- i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816)
- i40e: add check for return from find_first_bit call (bsc#1101816)
- i40e: add doxygen comment for new mode parameter (bsc#1101816)
- i40e: add function doc headers for ethtool stats functions (bsc#1101816)
- i40e: add function doc headers for ethtool stats functions (bsc#1101816)
- i40e: add function header for i40e_get_rxfh (bsc#1101816)
- i40e: add helper conversion function for link_speed (bsc#1101816)
- i40e: add tx_busy to ethtool stats (bsc#1101816)
- i40e: allow XPS with QoS enabled (bsc#1101816)
- i40e: always return VEB stat strings (bsc#1101816)
- i40e: always return all queue stat strings (bsc#1101816)
- i40e: avoid divide by zero (bsc#1101816)
- i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816)
- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816)
- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816)
- i40e: calculate ethtool stats size in a separate function (bsc#1101816)
- i40e: calculate ethtool stats size in a separate function (bsc#1101816)
- i40e: change flags to use 64 bits (bsc#1101816)
- i40e: change ppp name to ddp (bsc#1101816)
- i40e: check for invalid DCB config (bsc#1101816)
- i40e: cleanup unnecessary parens (bsc#1101816)
- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816)
- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816)
- i40e: cleanup wording in a header comment (bsc#1101816)
- i40e: convert i40e_get_settings_link_up to new API (bsc#1101816)
- i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816)
- i40e: convert i40e_set_link_ksettings to new API (bsc#1101816)
- i40e: disallow programming multiple filters with same criteria (bsc#1101816)
- i40e: disallow programming multiple filters with same criteria (bsc#1101816)
- i40e: display priority_xon and priority_xoff stats (bsc#1101816)
- i40e: do not clear suspended state until we finish resuming (bsc#1101816)
- i40e: do not clear suspended state until we finish resuming (bsc#1101816)
- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816)
- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816)
- i40e: do not force filter failure in overflow promiscuous (bsc#1101816)
- i40e: do not force filter failure in overflow promiscuous (bsc#1101816)
- i40e: do not hold spinlock while resetting VF (bsc#1101816)
- i40e: do not leak memory addresses (bsc#1101816)
- i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816)
- i40e: ensure reset occurs when disabling VF (bsc#1101816)
- i40e: factor out re-enable functions for ATR and SB (bsc#1101816)
- i40e: fix a typo (bsc#1101816)
- i40e: fix a typo in i40e_pf documentation (bsc#1101816)
- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816)
- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816)
- i40e: fix comment typo (bsc#1101816)
- i40e: fix flags declaration (bsc#1101816)
- i40e: fix for flow director counters not wrapping as expected (bsc#1101816)
- i40e: fix for flow director counters not wrapping as expected (bsc#1101816)
- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816)
- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816)
- i40e: fix handling of vf_states variable (bsc#1101816)
- i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816)
- i40e: fix incorrect register definition (bsc#1101816)
- i40e: fix link reporting (bsc#1101816)
- i40e: fix merge error (bsc#1101816)
- i40e: fix reading LLDP configuration (bsc#1101816)
- i40e: fix typo in function description (bsc#1101816)
- i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816)
- i40e: fold prefix strings directly into stat names (bsc#1101816)
- i40e: free skb after clearing lock in ptp_stop (bsc#1101816)
- i40e: free the skb after clearing the bitlock (bsc#1101816)
- i40e: group autoneg PHY types together (bsc#1101816)
- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816)
- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816)
- i40e: ignore skb->xmit_more when deciding to set RS bit (bsc#1101816)
- i40e: ignore skb->xmit_more when deciding to set RS bit (bsc#1101816)
- i40e: implement split pci error reset handler (bsc#1101816)
- i40e: limit lan queue count in large CPU count machine (bsc#1101816)
- i40e: limit lan queue count in large CPU count machine (bsc#1101816)
- i40e: make const array patterns static, reduces object code size (bsc#1101816)
- i40e: make const array patterns static, reduces object code size (bsc#1101816)
- i40e: make i40evf_map_rings_to_vectors void (bsc#1101816)
- i40e: make use of i40e_vc_disable_vf (bsc#1101816)
- i40e: mark PM functions as __maybe_unused (bsc#1101816)
- i40e: move AUTO_DISABLED flags into the state field (bsc#1101816)
- i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816)
- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816)
- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816)
- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816)
- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816)
- i40e: move client flags into state bits (bsc#1101816)
- i40e: prevent service task from running while we're suspended (bsc#1101816)
- i40e: prevent service task from running while we're suspended (bsc#1101816)
- i40e: re-enable PTP L4 capabilities for XL710 if FW >6.0 (bsc#1101816)
- i40e: re-enable PTP L4 capabilities for XL710 if FW >6.0 (bsc#1101816)
- i40e: re-number feature flags to remove gaps (bsc#1101816)
- i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816)
- i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816)
- i40e: refactor FW version checking (bsc#1101816)
- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816)
- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816)
- i40e: relax warning message in case of version mismatch (bsc#1101816)
- i40e: relax warning message in case of version mismatch (bsc#1101816)
- i40e: remove duplicate pfc stats (bsc#1101816)
- i40e: remove i40e_fcoe files (bsc#1101816)
- i40e: remove ifdef SPEED_25000 (bsc#1101816)
- i40e: remove logically dead code (bsc#1101816)
- i40e: remove redundant initialization of read_size (bsc#1101816)
- i40e: rename 'change' variable to 'autoneg_changed' (bsc#1101816)
- i40e: rename 'cmd' variables in ethtool interface (bsc#1101816)
- i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816)
- i40e: restore promiscuous after reset (bsc#1101816)
- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816)
- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816)
- i40e: simplify member variable accesses (bsc#1101816)
- i40e: split i40e_get_strings() into smaller functions (bsc#1101816)
- i40e: split i40e_get_strings() into smaller functions (bsc#1101816)
- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816)
- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816)
- i40e: track filter type statistics when deleting invalid filters (bsc#1101816)
- i40e: track filter type statistics when deleting invalid filters (bsc#1101816)
- i40e: track id can be 0 (bsc#1101816)
- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816)
- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816)
- i40e: update data pointer directly when copying to the buffer (bsc#1101816)
- i40e: update data pointer directly when copying to the buffer (bsc#1101816)
- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816)
- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816)
- i40e: use a local variable instead of calculating multiple times (bsc#1101816)
- i40e: use a local variable instead of calculating multiple times (bsc#1101816)
- i40e: use admin queue for setting LEDs behavior (bsc#1101816)
- i40e: use newer generic PM support instead of legacy PM callbacks (bsc#1101816)
- i40e: use newer generic PM support instead of legacy PM callbacks (bsc#1101816)
- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816)
- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816)
- i40e: use the more traditional 'i' loop variable (bsc#1101816)
- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816)
- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816)
- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816)
- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816)
- i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816)
- i40evf: Do not clear MSI-X PBA manually (bsc#1101816)
- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816)
- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816)
- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816)
- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816)
- i40evf: Fix a hardware reset support in VF driver (bsc#1101816)
- i40evf: Fix double locking the same resource (bsc#1101816)
- i40evf: Fix link up issue when queues are disabled (bsc#1101816)
- i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816)
- i40evf: Make VF reset warning message more clear (bsc#1101816)
- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816)
- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816)
- i40evf: Use an iterator of the same type as the list (bsc#1101816)
- i40evf: Use an iterator of the same type as the list (bsc#1101816)
- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816)
- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816)
- i40evf: fix client notify of l2 params (bsc#1101816)
- i40evf: fix ring to vector mapping (bsc#1101816)
- i40evf: hold the critical task bit lock while opening (bsc#1101816)
- i40evf: hold the critical task bit lock while opening (bsc#1101816)
- i40evf: lower message level (bsc#1101816)
- i40evf: release bit locks in reverse order (bsc#1101816)
- i40evf: remove flags that are never used (bsc#1101816)
- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816)
- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816)
- i40evf: use GFP_ATOMIC under spin lock (bsc#1101816)
- i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816)
- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816)
- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816)
- i40iw: Fix memory leak in error path of create QP (bsc#1058659)
- i40iw: Refactor of driver generated AEs (bsc#1058659)
- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659)
- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659)
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659)
- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659)
- ib/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793)
- ib/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793)
- ib/core: Fix error code for invalid GID entry (bsc#1046306)
- ib/core: Honor port_num while resolving GID for IB link layer (bsc#1046306)
- ib/core: Honor port_num while resolving GID for IB link layer (bsc#1046306)
- ib/core: Make ib_mad_client_id atomic (bsc#1046306)
- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306)
- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306)
- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306)
- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306)
- ib/hfi1 Use correct type for num_user_context (bsc#1096793)
- ib/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793)
- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463)
- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463)
- ib/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793)
- ib/hfi1: Complete check for locally terminated smp (bsc#1096793)
- ib/hfi1: Compute BTH only for rdma_WRITE_LAST/SEND_LAST packet (bsc#1096793)
- ib/hfi1: Compute BTH only for rdma_WRITE_LAST/SEND_LAST packet (bsc#1096793)
- ib/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793)
- ib/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793)
- ib/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793)
- ib/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793)
- ib/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793)
- ib/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793)
- ib/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793)
- ib/hfi1: Do not override given pcie_pset value (bsc#1096793)
- ib/hfi1: Ensure VL index is within bounds (bsc#1096793)
- ib/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793)
- ib/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793)
- ib/hfi1: Fix fault injection init/exit issues (bsc#1060463)
- ib/hfi1: Fix for early release of sdma context (bsc#1096793)
- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463)
- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463)
- ib/hfi1: Fix loss of BECN with AHG (bsc#1096793)
- ib/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793)
- ib/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793)
- ib/hfi1: Fix serdes loopback set-up (bsc#1096793)
- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463)
- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463)
- ib/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793)
- ib/hfi1: Inline common calculation (bsc#1096793)
- ib/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793)
- ib/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793)
- ib/hfi1: Look up ibport using a pointer in receive path (bsc#1096793)
- ib/hfi1: Look up ibport using a pointer in receive path (bsc#1096793)
- ib/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793)
- ib/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793)
- ib/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793)
- ib/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793)
- ib/hfi1: Prevent LNI hang when LCB can't obtain lanes (bsc#1096793)
- ib/hfi1: Prevent LNI hang when LCB can't obtain lanes (bsc#1096793)
- ib/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793)
- ib/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793)
- ib/hfi1: Race condition between user notification and driver state (bsc#1096793)
- ib/hfi1: Race condition between user notification and driver state (bsc#1096793)
- ib/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793)
- ib/hfi1: Refactor get_base_info (bsc#1096793)
- ib/hfi1: Refactor get_ctxt_info (bsc#1096793)
- ib/hfi1: Refactor get_user() IOCTLs (bsc#1096793)
- ib/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793)
- ib/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793)
- ib/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793)
- ib/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793)
- ib/hfi1: Reorder incorrect send context disable (bsc#1096793)
- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463)
- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463)
- ib/hfi1: Return correct value for device state (bsc#1096793)
- ib/hfi1: Send 'reboot' as planned down remote reason (bsc#1096793)
- ib/hfi1: Send 'reboot' as planned down remote reason (bsc#1096793)
- ib/hfi1: Set port number for errorinfo MAD response (bsc#1096793)
- ib/hfi1: Show fault stats in both TX and RX directions (bsc#1096793)
- ib/hfi1: Show fault stats in both TX and RX directions (bsc#1096793)
- ib/hfi1: Update HFI to use the latest pci API (bsc#1096793)
- ib/hfi1: Use after free race condition in send context error path (bsc#1096793)
- ib/hfi1: Use after free race condition in send context error path (bsc#1096793)
- ib/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793)
- ib/ipoib: Change number of TX wqe to 64 (bsc#1096793)
- ib/ipoib: Fix for notify send CQ failure messages (bsc#1096793)
- ib/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793)
- ib/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793)
- ib/ipoib: Use NAPI in UD/TX flows (bsc#1096793)
- ib/iser: Do not reduce max_sectors (bsc#1046306)
- ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306)
- ib/isert: fix T10-pi check mask setting (bsc#1046306)
- ib/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()' (bsc#1046302)
- ib/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()' (bsc#1046302)
- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302)
- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302)
- ib/mlx5: Fetch soft WQE's on fatal error state (bsc#1046305)
- ib/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046305)
- ib/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046305)
- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301)
- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301)
- ib/rdmavt: Add trace for RNRNAK timer (bsc#1096793)
- ib/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793)
- ib/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793)
- ib/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793)
- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306)
- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306)
- ib/rxe: add RXE_START_MASK for rxe_opcode IB_OPCODE_RC_SEND_ONLY_INV (bsc#1046306)
- ib/rxe: add RXE_START_MASK for rxe_opcode IB_OPCODE_RC_SEND_ONLY_INV (bsc#1046306)
- ib/rxe: avoid double kfree_skb (bsc#1046306)
- ib/umem: Use the correct mm during ib_umem_release (bsc#1046306)
- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306)
- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306)
- ib/{hfi1, qib}: Add handling of kernel restart (bsc#1096793)
- ib/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793)
- ib/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793)
- ib/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793)
- ib/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793)
- ibmvnic: Fix error recovery on login failure (bsc#1101789)
- ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918)
- ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918)
- ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918)
- idr: fix invalid ptr dereference on item delete (bsc#1051510)
- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28)
- igb: Fix not adding filter elements to the list (bsc#1056651)
- igb: Fix queue selection on MAC filters on i210 (bsc#1056651)
- iio: BME280: Updates to Humidity readings need ctrl_reg write! (bsc#1051510)
- iio: accel: st_accel: fix data-ready line configuration (bsc#1051510)
- iio: accel: st_accel_i2c: fix i2c_device_id table (bsc#1051510)
- iio: accel: st_accel_spi: fix spi_device_id table (bsc#1051510)
- iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510)
- iio: adc: sun4i-gpadc-iio: fix unbalanced irq enable/disable (bsc#1051510)
- iio: adc: twl4030: Return an error if we can not enable the vusb3v1 regulator in 'twl4030_madc_probe()' (bsc#1051510)
- iio: buffer: fix the function signature to match implementation (bsc#1051510)
- iio: gyro: st_gyro: fix L3GD20H support (bsc#1051510)
- iio: humidity: hts221: remove warnings in hts221_parse_{temp,rh}_caldata() (bsc#1051510)
- iio: imu: inv_mpu6050: test whoami first and against all known values (bsc#1051510)
- iio: magnetometer: st_magn: fix drdy line configuration for LIS3MDL (bsc#1051510)
- iio: magnetometer: st_magn_core: enable multiread by default for LIS3MDL (bsc#1051510)
- iio: magnetometer: st_magn_spi: fix spi_device_id table (bsc#1051510)
- iio: pressure: bmp280: fix relative humidity unit (bsc#1051510)
- iio: pressure: st_pressure: fix drdy configuration for LPS22HB and LPS25H (bsc#1051510)
- iio: pressure: zpa2326: Remove always-true check which confuses gcc (bsc#1051510)
- iio: pressure: zpa2326: report interrupted case as failure (bsc#1051510)
- iio: trigger: stm32-timer: fix quadrature mode get routine (bsc#1051510)
- iio: trigger: stm32-timer: fix write_raw return value (bsc#1051510)
- iio: tsl2583: correct values in integration_time_available (bsc#1051510)
- iio:buffer: make length types match kfifo types (bsc#1051510)
- iio:kfifo_buf: check for uint overflow (bsc#1051510)
- infiniband: fix a possible use-after-free bug (bsc#1046306)
- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) acpi ID (bsc#1051510)
- input: elan_i2c_smbus - fix more potential stack buffer overflows (bsc#1051510)
- input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510)
- input: elantech - fix V4 report decoding for module with middle key (bsc#1051510)
- input: xpad - fix GPD Win 2 controller name (bsc#1051510)
- iommu/vt-d: Clear Page Request Overflow fault bit
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034)
- ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10)
- ip6_gre: init dev->mtu and dev->hard_header_len correctly (networking-stable-18_01_28)
- ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10)
- ip6_tunnel: remove magic mtu value 0xFFF8 (networking-stable-18_06_08)
- ip6mr: fix stale iterator (networking-stable-18_02_06)
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes)
- ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10)
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1102512)
- ipmr: properly check rhltable_init() return value (networking-stable-18_06_08)
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28)
- ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15)
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15)
- ipv4: remove warning in ip_recv_error (networking-stable-18_06_08)
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07)
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26)
- ipv6: allow PMTU exceptions to local routes (networking-stable-18_06_20)
- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28)
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28)
- ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28)
- ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10)
- ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes)
- ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28)
- ipv6: sr: fix memory OOB access in seg6_do_srh_encap/inline (networking-stable-18_06_08)
- ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28)
- ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10)
- ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10)
- irqchip/gic-v3-its: Ensure nr_ites >= nr_lpis (bsc#1098401)
- iw_cxgb4: Add ib_device->get_netdev support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543)
- iw_cxgb4: initialize ib_mr fields for user mrs (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- iwlwifi: fw: harden page loading code (bsc#1051510)
- iwlwifi: pcie: compare with number of IRQs requested for, not number of CPUs (bsc#1051510)
- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674)
- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674)
- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674)
- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674)
- ixgbe: Add receive length error counter (bsc#1101674)
- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674)
- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674)
- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674)
- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674)
- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674)
- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674)
- ixgbe: Clear SWFW_SYNC register during init (bsc#1101674)
- ixgbe: Default to 1 pool always being allocated (bsc#1101674)
- ixgbe: Do not assume dev->num_tc is equal to hardware TC config (bsc#1101674)
- ixgbe: Do not assume dev->num_tc is equal to hardware TC config (bsc#1101674)
- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674)
- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674)
- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674)
- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674)
- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674)
- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674)
- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674)
- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674)
- ixgbe: Fix handling of macvlan Tx offload (bsc#1101674)
- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674)
- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674)
- ixgbe: Fix kernel-doc format warnings (bsc#1101674)
- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674)
- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674)
- ixgbe: Fix logical operators typo (bsc#1101674)
- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674)
- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674)
- ixgbe: Perform reinit any time number of VFs change (bsc#1101674)
- ixgbe: Remove an obsolete comment about ITR (bsc#1101674)
- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674)
- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674)
- ixgbe: Update adaptive ITR algorithm (bsc#1101674)
- ixgbe: Use ring values to test for Tx pending (bsc#1101674)
- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674)
- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674)
- ixgbe: add error checks when initializing the PHY (bsc#1101674)
- ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674)
- ixgbe: add support for reporting 5G link speed (bsc#1101674)
- ixgbe: advertise highest capable link speed (bsc#1101674)
- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674)
- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674)
- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674)
- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674)
- ixgbe: enable multicast on shutdown for WOL (bsc#1101674)
- ixgbe: extend firmware version support (bsc#1101674)
- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674)
- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674)
- ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674)
- ixgbe: fix possible race in reset subtask (bsc#1101674)
- ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674)
- ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674)
- ixgbe: force VF to grab new MAC on driver reload (bsc#1101674)
- ixgbe: introduce a helper to simplify code (bsc#1101674)
- ixgbe: remove redundant initialization of 'pool' (bsc#1101674)
- ixgbe: remove unused enum latency_range (bsc#1101674)
- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674)
- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674)
- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674)
- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674)
- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674)
- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674)
- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674)
- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674)
- ixgbevf: Fix kernel-doc format warnings (bsc#1101674)
- ixgbevf: add build_skb support (bsc#1101674)
- ixgbevf: add counters for Rx page allocations (bsc#1101674)
- ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674)
- ixgbevf: add function for checking if we can reuse page (bsc#1101674)
- ixgbevf: add function for checking if we can reuse page (bsc#1101674)
- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674)
- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674)
- ixgbevf: add support for padding packet (bsc#1101674)
- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674)
- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674)
- ixgbevf: allocate the rings as part of q_vector (bsc#1101674)
- ixgbevf: break out Rx buffer page management (bsc#1101674)
- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674)
- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674)
- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674)
- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674)
- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674)
- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674)
- ixgbevf: fix ixgbevf_xmit_frame()'s return type (bsc#1101674)
- ixgbevf: fix possible race in the reset subtask (bsc#1101674)
- ixgbevf: fix unused variable warning (bsc#1101674)
- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674)
- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674)
- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674)
- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674)
- ixgbevf: only DMA sync frame length (bsc#1101674)
- ixgbevf: remove redundant initialization of variable 'dma' (bsc#1101674)
- ixgbevf: remove redundant initialization of variable 'dma' (bsc#1101674)
- ixgbevf: remove redundant setting of xcast_mode (bsc#1101674)
- ixgbevf: setup queue counts (bsc#1101674)
- ixgbevf: update code to better handle incrementing page count (bsc#1101674)
- ixgbevf: update code to better handle incrementing page count (bsc#1101674)
- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674)
- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674)
- ixgbevf: use length to determine if descriptor is done (bsc#1101674)
- ixgbevf: use length to determine if descriptor is done (bsc#1101674)
- ixgbevf: use page_address offset from page (bsc#1101674)
- jump_label: Add branch hints to static_branch_{un,}likely() (bnc#1101669 optimise numa balancing for fast migrate)
- kABI fixes for nvme-if_ready-checks-fail-io-to-deleting-controll.patch (bsc#1077989)
- kABI fixes for qla2xxx-Fix-inconsistent-DMA-mem-alloc-free.patch (bsc#1077989)
- kABI: protect ife_tlv_meta_decode (kabi)
- kABI: protect struct cstate (kabi)
- kabi cxgb4 MU (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- kabi mlx5 hide cpu_rmap (bsc#1046303)
- kabi mvpp2 10gkr support (bsc#1098633)
- kabi protect fwnode_handle (bsc#1098633)
- kabi/severities: add nvdimm internal symbols to kabi ignore list
- kabi/severities: add qed inter module symbols to kabi ignore list
- kcm: Fix use-after-free caused by clonned sockets (networking-stable-18_06_08)
- kcm: lock lower socket in kcm_attach (networking-stable-18_03_28)
- kconfig: Avoid format overflow warning from GCC 8.1 (bsc#1051510)
- kconfig: Do not leak main menus during parsing (bsc#1051510)
- kconfig: Fix automatic menu creation mem leak (bsc#1051510)
- kconfig: Fix expr_free() E_NOT leak (bsc#1051510)
- kernel/params.c: downgrade warning for unsafe parameters (bsc#1051510)
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bsc#1051510)
- keys: DNS: fix parsing multiple options (bsc#1051510)
- keys: DNS: limit the length of option strings (networking-stable-18_04_26)
- kmod: fix wait on recursive loop (bsc#1099792)
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792)
- kmod: throttle kmod thread limit (bsc#1099792)
- kobject: do not use WARN for registration failures (bsc#1051510)
- kvm: PPC: Check if IOMMU page is contained in the pinned physical page (bsc#1077761, git-fixes)
- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183)
- kvm: x86: fix vcpu initialization with userspace lapic (bsc#1101564)
- kvm: x86: move LAPIC initialization after VMCS creation (bsc#1101564)
- l2tp: check sockaddr length in pppol2tp_connect() (networking-stable-18_04_26)
- lan78xx: Crash in lan78xx_writ_reg (Workqueue: events lan78xx_deferred_multicast_write) (networking-stable-18_04_10)
- lib/kobject: Join string literals back (bsc#1051510)
- lib/string_helpers: Add missed declaration of struct task_struct (bsc#1099918)
- lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly (bsc#1051510)
- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bsc#1051510)
- libata: Blacklist some Sandisk SSDs for NCQ (bsc#1051510)
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bsc#1051510)
- libata: blacklist Micron 500IT SSD with MU01 firmware (bsc#1051510)
- libata: zpodd: make arrays cdb static, reduces object code size (bsc#1051510)
- libata: zpodd: small read overflow in eject_tray() (bsc#1051510)
- libnvdimm, label: fix index block size calculation (bsc#1102147)
- libnvdimm, pmem: Add sysfs notifications to badblocks
- libnvdimm, pmem: Do not flush power-fail protected CPU caches (bsc#1091424)
- libnvdimm, pmem: Unconditionally deep flush on *sync (bsc#1091424)
- libnvdimm, region, pmem: fix 'badblocks' sysfs_get_dirent() reference lifetime
- libnvdimm, region, pmem: fix 'badblocks' sysfs_get_dirent() reference lifetime
- libnvdimm: add an api to cast a 'struct nd_region' to its 'struct device' (bsc#1094119)
- llc: better deal with too small mtu (networking-stable-18_05_15)
- llc: delete timers synchronously in llc_sk_free() (networking-stable-18_04_26)
- llc: fix NULL pointer deref for SOCK_ZAPPED (networking-stable-18_04_26)
- llc: hold llc_sap before release_sock() (networking-stable-18_04_26)
- locking/qspinlock: Ensure node is initialised before updating prev->next (bsc#1050549)
- locking/qspinlock: Ensure node->count is updated before initialising node (bsc#1050549)
- locking: Remove smp_read_barrier_depends() from queued_spin_lock_slowpath() (bsc#1050549)
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bsc#1051510)
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason
- macvlan: filter out unsupported feature flags (networking-stable-18_03_28)
- macvlan: fix memory hole in macvlan_dev (bsc#1099918)
- macvlan: remove unused fields in struct macvlan_dev (bsc#1099918)
- mailbox: PCC: erroneous error message when parsing acpi PCCT (bsc#1096330)
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush sequence (bsc#1051510)
- mailbox: bcm-flexrm-mailbox: Fix mask used in CMPL_START_ADDR_VALUE() (bsc#1051510)
- mailbox: bcm2835: Fix of_xlate return value (bsc#1051510)
- mailbox: mailbox-test: do not rely on rx_buffer content to signal data ready (bsc#1051510)
- mdio-sun4i: Fix a memory leak (bsc#1051510)
- media: coda/imx-vdoa: Check for platform_get_resource() error (bsc#1051510)
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bsc#1051510)
- media: cx25840: Use subdev host data for PLL override (bsc#1051510)
- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1051510)
- media: cxusb: restore RC_MAP for MyGica T230 (bsc#1051510)
- media: dt-bindings: media: rcar_vin: Use status 'okay' (bsc#1051510)
- media: dvb-core: always call invoke_release() in fe_free() (bsc#1051510)
- media: dvb_frontend: fix ifnullfree.cocci warnings (bsc#1051510)
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bsc#1051510)
- media: dvb_frontend: only use kref after initialized (bsc#1051510)
- media: dvb_net: ensure that dvb_net_ule_handle is fully initialized (bsc#1051510)
- media: mxl111sf: Fix potential null pointer dereference (bsc#1051510)
- media: omap3isp/isp: remove an unused static var (bsc#1051510)
- media: s5p-jpeg: fix number of components macro (bsc#1051510)
- media: s5p-mfc: Fix lock contention - request_firmware() once (bsc#1051510)
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918)
- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bsc#1051510)
- media: uvcvideo: Support realtek's UVC 1.5 device (bsc#1099109)
- media: v4l2-compat-ioctl32: prevent go past max size (bsc#1051510)
- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#1051510)
- mfd: intel-lpss: Fix Intel Cannon Lake LPSS I2C input clock (bsc#1051510)
- mfd: intel-lpss: Program REMAP register in PIO mode (bsc#1051510)
- mfd: tps65218: Reorder tps65218_regulator_id enum (bsc#1051510)
- mfd: tps65911-comparator: Fix a build error (bsc#1051510)
- mfd: tps65911-comparator: Fix an off by one bug (bsc#1051510)
- mlxsw: spectrum: Forbid creation of VLAN 1 over port/LAG (networking-stable-18_06_08)
- mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic (networking-stable-18_03_28)
- mlxsw: spectrum_router: Do not log an error on missing neighbor (networking-stable-18_01_28)
- mlxsw: spectrum_router: Fix error path in mlxsw_sp_vr_create (networking-stable-18_03_07)
- mlxsw: spectrum_switchdev: Check success of FDB add operation (networking-stable-18_03_07)
- mm, oom_reaper: skip mm structs with mmu notifiers (bsc#1099918)
- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (, bsc#1078248)
- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (bsc#1078248)
- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (, bsc#1078248)
- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (bsc#1078248)
- mm/pkeys: Add an empty arch_pkeys_enabled() (, bsc#1078248)
- mm/pkeys: Add an empty arch_pkeys_enabled() (bsc#1078248)
- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (, bsc#1078248)
- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (bsc#1078248)
- mmc: Downgrade printk level for MMC SDHCI host version error (bsc#1097941)
- mmc: cavium: Fix use-after-free in of_platform_device_destroy (bsc#1051510)
- mmc: dw_mmc: exynos: fix the suspend/resume issue for exynos5433 (bsc#1051510)
- mmc: dw_mmc: fix card threshold control configuration (bsc#1051510)
- mmc: meson-gx: remove CLK_DIVIDER_ALLOW_ZERO clock flag (bsc#1051510)
- mmc: sdhci-msm: fix issue with power irq (bsc#1051510)
- mmc: sdhci-of-esdhc: disable SD clock for clock value 0 (bsc#1051510)
- mmc: sdhci-of-esdhc: fix eMMC couldn't work after kexec (bsc#1051510)
- mmc: sdhci-of-esdhc: fix the mmc error after sleep on ls1046ardb (bsc#1051510)
- mmc: sdhci-xenon: Fix clock resource by adding an optional bus clock (bsc#1051510)
- mmc: sdhci-xenon: wait 5ms after set 1.8V signal enable (bsc#1051510)
- mmc: tmio: remove outdated comment (bsc#1051510)
- modsign: log module name in the event of an error (bsc#1093666)
- modsign: print module name along with error message (bsc#1093666)
- module: make it clear when we're handling the module copy in info->hdr (bsc#1093666)
- module: setup load info before module_sig_check() (bsc#1093666)
- mq-deadline: Enable auto-loading when built as module (bsc#1099918)
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918)
- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bsc#1099918)
- mtd: nand: fsl_ifc: Fix eccstat array overflow for IFC ver >= 2.0.0 (bsc#1099918)
- mtd: partitions: add helper for deleting partition (bsc#1099918)
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918)
- mvpp2: fix multicast address filter (bsc#1098633)
- n_tty: Access echo_* variables carefully (bsc#1051510)
- n_tty: Fix stall at n_tty_receive_char_special() (bsc#1051510)
- nbd: do not start req until after the dead connection logic (bsc#1099918)
- nbd: fix -ERESTARTSYS handling (bsc#1099918)
- nbd: fix nbd device deletion (bsc#1099918)
- nbd: fix return value in error handling path (bsc#1099918)
- nbd: wait uninterruptible for the dead timeout (bsc#1099918)
- net sched actions: fix refcnt leak in skbmod (networking-stable-18_05_15)
- net-sysfs: Fix memory leak in XPS configuration (networking-stable-18_06_08)
- net/ipv6: Fix route leaking between VRFs (networking-stable-18_04_10)
- net/ipv6: Increment OUTxxx counters after netfilter hook (networking-stable-18_04_10)
- net/iucv: Free memory obtained by kzalloc (networking-stable-18_03_28)
- net/mlx4: Fix irq-unsafe spinlock usage (networking-stable-18_06_08)
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300)
- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300)
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300)
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300)
- net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299)
- net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()' (networking-stable-18_05_15)
- net/mlx4_en: Verify coalescing parameters are in range (networking-stable-18_05_15)
- net/mlx5: Adjust clock overflow work period (bsc#1046303)
- net/mlx5: E-Switch, Include VF rdma stats in vport statistics (networking-stable-18_05_15)
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303)
- net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303)
- net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303)
- net/mlx5: Fix command interface race in polling mode (bsc#1046300)
- net/mlx5: Fix command interface race in polling mode (bsc#1046300)
- net/mlx5: Fix dump_command mailbox length printed (bsc#1046303)
- net/mlx5: Fix incorrect raw command length parsing (bsc#1046300)
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300)
- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300)
- net/mlx5: Free IRQs in shutdown path (bsc#1046303)
- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303)
- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303)
- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303)
- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303)
- net/mlx5: Protect from command bit overflow (bsc#1046303)
- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303)
- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303)
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303)
- net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303)
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303)
- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303)
- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300)
- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300)
- net/mlx5e: Err if asked to offload TC match on frag being first (networking-stable-18_05_15)
- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303)
- net/mlx5e: Refine ets validation function (bsc#1075360)
- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303)
- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303)
- net/mlx5e: TX, Use correct counter in dma_map error flow (networking-stable-18_05_15)
- net/mlx5e: When RXFCS is set, add FCS data into checksum calculation (networking-stable-18_06_08)
- net/packet: refine check for priv area size (networking-stable-18_06_08)
- net/sched: act_simple: fix parsing of TCA_DEF_DATA (networking-stable-18_06_20)
- net/sched: act_tunnel_key: fix NULL dereference when 'goto chain' is used (bsc#1056787)
- net/sched: cls_u32: fix cls_u32 on filter replace (networking-stable-18_03_07)
- net/sched: fix NULL dereference in the error path of tcf_sample_init() (bsc#1056787)
- net: Allow neigh contructor functions ability to modify the primary_key (networking-stable-18_01_28)
- net: Fix hlist corruptions in inet_evict_bucket() (networking-stable-18_03_28)
- net: Only honor ifindex in IP_PKTINFO if non-0 (networking-stable-18_03_28)
- net: add rb_to_skb() and other rb tree helpers (bsc#1102340)
- net: af_packet: fix race in PACKET_{R|T}X_RING (networking-stable-18_04_26)
- net: cxgb3_main: fix potential Spectre v1 (bsc#1046533)
- net: define the TSO header size in net/tso.h (bsc#1098633)
- net: dsa: add error handling for pskb_trim_rcsum (networking-stable-18_06_20)
- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (networking-stable-18_03_28)
- net: ethernet: davinci_emac: fix error handling in probe() (networking-stable-18_06_08)
- net: ethernet: sun: niu set correct packet size in skb (networking-stable-18_05_15)
- net: ethernet: ti: cpdma: correct error handling for chan create (networking-stable-18_06_08)
- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (networking-stable-18_03_28)
- net: ethernet: ti: cpsw: fix net watchdog timeout (networking-stable-18_03_07)
- net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode (networking-stable-18_05_15)
- net: ethernet: ti: cpsw: fix tx vlan priority mapping (networking-stable-18_04_26)
- net: ethtool: Add macro to clear a link mode setting (bsc#1101816)
- net: ethtool: Add macro to clear a link mode setting (bsc#1101816)
- net: fec: Fix unbalanced PM runtime calls (networking-stable-18_03_28)
- net: fix deadlock while clearing neighbor proxy table (networking-stable-18_04_26)
- net: fix possible out-of-bound read in skb_network_protocol() (networking-stable-18_04_10)
- net: fool proof dev_valid_name() (networking-stable-18_04_10)
- net: in virtio_net_hdr only add VLAN_HLEN to csum_start if payload holds vlan (networking-stable-18_06_20)
- net: ipv4: add missing RTA_TABLE to rtm_ipv4_policy (networking-stable-18_06_08)
- net: ipv4: avoid unused variable warning for sysctl (git-fixes)
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (networking-stable-18_03_07)
- net: ipv6: keep sk status consistent after datagram connect failure (networking-stable-18_03_28)
- net: metrics: add proper netlink validation (networking-stable-18_06_08)
- net: mvmdio: add xmdio xsmi support (bsc#1098633)
- net: mvmdio: check the MII_ADDR_C45 bit is not set for smi operations (bsc#1098633)
- net: mvmdio: introduce an ops structure (bsc#1098633)
- net: mvmdio: put the poll intervals in the ops structure (bsc#1098633)
- net: mvmdio: remove duplicate locking (bsc#1098633)
- net: mvmdio: reorder headers alphabetically (bsc#1098633)
- net: mvmdio: simplify the smi read and write error paths (bsc#1098633)
- net: mvmdio: use GENMASK for masks (bsc#1098633)
- net: mvmdio: use tabs for defines (bsc#1098633)
- net: mvpp2: Add hardware offloading for VLAN filtering (bsc#1098633)
- net: mvpp2: Add support for unicast filtering (bsc#1098633)
- net: mvpp2: Do not use dynamic allocs for local variables (bsc#1098633)
- net: mvpp2: Fix DMA address mask size (bsc#1098633)
- net: mvpp2: Fix TCAM filter reserved range (bsc#1098633)
- net: mvpp2: Fix clk error path in mvpp2_probe (bsc#1098633)
- net: mvpp2: Fix clock resource by adding an optional bus clock (bsc#1098633)
- net: mvpp2: Fix clock resource by adding missing mg_core_clk (bsc#1098633)
- net: mvpp2: Fix parser entry init boundary check (bsc#1098633)
- net: mvpp2: Make mvpp2_prs_hw_read a parser entry init function (bsc#1098633)
- net: mvpp2: Prevent userspace from changing TX affinities (bsc#1098633)
- net: mvpp2: Simplify MAC filtering function parameters (bsc#1098633)
- net: mvpp2: Use relaxed I/O in data path (bsc#1098633)
- net: mvpp2: add comments about smp_processor_id() usage (bsc#1098633)
- net: mvpp2: add ethtool GOP statistics (bsc#1098633)
- net: mvpp2: add support for TX interrupts and RX queue distribution modes (bsc#1098633)
- net: mvpp2: adjust the coalescing parameters (bsc#1098633)
- net: mvpp2: align values in ethtool get_coalesce (bsc#1098633)
- net: mvpp2: allocate zeroed tx descriptors (bsc#1098633)
- net: mvpp2: check ethtool sets the Tx ring size is to a valid min value (bsc#1098633)
- net: mvpp2: cleanup probed ports in the probe error path (bsc#1098633)
- net: mvpp2: do not call txq_done from the Tx path when Tx irqs are used (bsc#1098633)
- net: mvpp2: do not disable GMAC padding (bsc#1098633)
- net: mvpp2: do not select the internal source clock (bsc#1098633)
- net: mvpp2: do not set GMAC autoneg when using XLG MAC (bsc#1098633)
- net: mvpp2: do not sleep in set_rx_mode (bsc#1098633)
- net: mvpp2: do not unmap TSO headers buffers (bsc#1098633)
- net: mvpp2: dynamic reconfiguration of the comphy/GoP/MAC (bsc#1098633)
- net: mvpp2: enable UDP/TCP checksum over IPv6 (bsc#1098633)
- net: mvpp2: enable acpi support in the driver (bsc#1098633)
- net: mvpp2: enable basic 10G support (bsc#1098633)
- net: mvpp2: fallback using h/w and random mac if the dt one isn't valid (bsc#1098633)
- net: mvpp2: fix GOP statistics loop start and stop conditions (bsc#1098633)
- net: mvpp2: fix MVPP21_ISR_RXQ_GROUP_REG definition (bsc#1098633)
- net: mvpp2: fix TSO headers allocation and management (bsc#1098633)
- net: mvpp2: fix invalid parameters order when calling the tcam init (bsc#1098633)
- net: mvpp2: fix parsing fragmentation detection (bsc#1098633)
- net: mvpp2: fix port list indexing (bsc#1098633)
- net: mvpp2: fix the RSS table entry offset (bsc#1098633)
- net: mvpp2: fix the packet size configuration for 10G (bsc#1098633)
- net: mvpp2: fix the synchronization module bypass macro name (bsc#1098633)
- net: mvpp2: fix the txq_init error path (bsc#1098633)
- net: mvpp2: fix typo in the tcam setup (bsc#1098633)
- net: mvpp2: fix use of the random mac address for PPv2.2 (bsc#1098633)
- net: mvpp2: improve the link management function (bsc#1098633)
- net: mvpp2: initialize the GMAC when using a port (bsc#1098633)
- net: mvpp2: initialize the GoP (bsc#1098633)
- net: mvpp2: initialize the RSS tables (bsc#1098633)
- net: mvpp2: initialize the Tx FIFO size (bsc#1098633)
- net: mvpp2: initialize the XLG MAC when using a port (bsc#1098633)
- net: mvpp2: initialize the comphy (bsc#1098633)
- net: mvpp2: introduce per-port nrxqs/ntxqs variables (bsc#1098633)
- net: mvpp2: introduce queue_vector concept (bsc#1098633)
- net: mvpp2: jumbo frames support (bsc#1098633)
- net: mvpp2: limit TSO segments and use stop/wake thresholds (bsc#1098633)
- net: mvpp2: make the phy optional (bsc#1098633)
- net: mvpp2: move from cpu-centric naming to 'software thread' naming (bsc#1098633)
- net: mvpp2: move the mac retrieval/copy logic into its own function (bsc#1098633)
- net: mvpp2: move the mii configuration in the ndo_open path (bsc#1098633)
- net: mvpp2: mvpp2_check_hw_buf_num() can be static (bsc#1098633)
- net: mvpp2: only free the TSO header buffers when it was allocated (bsc#1098633)
- net: mvpp2: remove RX queue group reset code (bsc#1098633)
- net: mvpp2: remove mvpp2_pool_refill() (bsc#1098633)
- net: mvpp2: remove unused mvpp2_bm_cookie_pool_set() function (bsc#1098633)
- net: mvpp2: remove useless goto (bsc#1098633)
- net: mvpp2: report the tx-usec coalescing information to ethtool (bsc#1098633)
- net: mvpp2: set maximum packet size for 10G ports (bsc#1098633)
- net: mvpp2: set the Rx FIFO size depending on the port speeds for PPv2.2 (bsc#1098633)
- net: mvpp2: simplify maintaining enabled ports' list (bsc#1098633)
- net: mvpp2: simplify the Tx desc set DMA logic (bsc#1098633)
- net: mvpp2: simplify the link_event function (bsc#1098633)
- net: mvpp2: software tso support (bsc#1098633)
- net: mvpp2: split the max ring size from the default one (bsc#1098633)
- net: mvpp2: take advantage of the is_rgmii helper (bsc#1098633)
- net: mvpp2: unify register definitions coding style (bsc#1098633)
- net: mvpp2: unify the txq size define use (bsc#1098633)
- net: mvpp2: update the BM buffer free/destroy logic (bsc#1098633)
- net: mvpp2: use a data size of 10kB for Tx FIFO on port 0 (bsc#1098633)
- net: mvpp2: use correct index on array mvpp2_pools (bsc#1098633)
- net: mvpp2: use device_*/fwnode_* APIs instead of of_* (bsc#1098633)
- net: mvpp2: use the GoP interrupt for link status changes (bsc#1098633)
- net: mvpp2: use the aggr txq size define everywhere (bsc#1098633)
- net: mvpp2: use the same buffer pool for all ports (bsc#1098633)
- net: phy: Tell caller result of phy_change() (networking-stable-18_03_28)
- net: phy: add XAUI and 10GBASE-KR PHY connection types (bsc#1098633)
- net: phy: broadcom: Fix auxiliary control register reads (networking-stable-18_06_08)
- net: phy: broadcom: Fix bcm_write_exp() (networking-stable-18_06_08)
- net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE for DP83620 (networking-stable-18_06_20)
- net: phy: fix phy_start to consider PHY_IGNORE_INTERRUPT (networking-stable-18_03_07)
- net: qdisc_pkt_len_init() should be more robust (networking-stable-18_01_28)
- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301)
- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301)
- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319)
- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319)
- net: sched: fix error path in tcf_proto_create() when modules are not configured (networking-stable-18_05_15)
- net: sched: ife: check on metadata length (networking-stable-18_04_26)
- net: sched: ife: handle malformed tlv length (networking-stable-18_04_26)
- net: sched: ife: signal not finding metaid (networking-stable-18_04_26)
- net: sched: red: avoid hashing NULL child (bsc#1056787)
- net: sched: report if filter is too large to dump (networking-stable-18_03_07)
- net: support compat 64-bit time in {s,g}etsockopt (networking-stable-18_05_15)
- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (networking-stable-18_03_28)
- net: tcp: close sock if net namespace is exiting (networking-stable-18_01_28)
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (networking-stable-18_06_08)
- net: validate attribute sizes in neigh_dump_table() (networking-stable-18_04_26)
- net: vrf: Add support for sends to local broadcast address (networking-stable-18_01_28)
- net_sched: fq: take care of throttled flows before reuse (networking-stable-18_05_15)
- netdev-FAQ: clarify DaveM's position for stable backports (networking-stable-18_06_08)
- netlink: avoid a double skb free in genlmsg_mcast() (git-fixes)
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (networking-stable-18_03_07)
- netlink: extack needs to be reset each time through loop (networking-stable-18_01_28)
- netlink: make sure nladdr has correct size in netlink_connect() (networking-stable-18_04_10)
- netlink: reset extack earlier in netlink_rcv_skb (networking-stable-18_01_28)
- nfc: llcp: Limit size of SDP URI (bsc#1051510)
- nfc: nfcmrvl_uart: fix device-node leak during probe (bsc#1051510)
- nfc: pn533: Fix wrong GFP flag usage (bsc#1051510)
- nfc: pn533: do not send usb data off of the stack (bsc#1051510)
- nfit, address-range-scrub: add module option to skip initial ars (bsc#1094119)
- nfit, address-range-scrub: determine one platform max_ars value (bsc#1094119)
- nfit, address-range-scrub: fix scrub in-progress reporting (bsc#1051510)
- nfit, address-range-scrub: introduce nfit_spa->ars_state (bsc#1094119)
- nfit, address-range-scrub: rework and simplify ARS state machine (bsc#1094119)
- nfit: fix region registration vs block-data-window ranges (bsc#1051510)
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1051510)
- nfs: Revert 'NFS: Move the flock open mode check into nfs_flock()' (bsc#1098983)
- nfsv4: Revert commit 5f83d86cf531d ('NFSv4.x: Fix wraparound issues..') (git-fixes)
- nl80211: relax ht operation checks for mesh (bsc#1051510)
- nubus: Avoid array underflow and overflow (bsc#1099918)
- nubus: Fix up header split (bsc#1099918)
- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098706)
- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098706)
- nvme-fabrics: centralize discovery controller defaults (bsc#1098706)
- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098706)
- nvme-fabrics: handle the admin-only case properly in nvmf_check_ready (bsc#1098706)
- nvme-fabrics: refactor queue ready check (bsc#1098706)
- nvme-fabrics: remove unnecessary controller subnqn validation (bsc#1098706)
- nvme-fc: change controllers first connect to use reconnect path (bsc#1098706)
- nvme-fc: fix nulling of queue data on reconnect (bsc#1098706)
- nvme-fc: release io queues to allow fast fail (bsc#1098706)
- nvme-fc: remove reinit_request routine (bsc#1098706)
- nvme-fc: remove setting DNR on exception conditions (bsc#1098706)
- nvme-loop: add support for multiple ports (bsc#1054245)
- nvme-multipath: fix sysfs dangerously created links (bsc#1096529)
- nvme-rdma: Fix command completion race at error recovery (bsc#1099041)
- nvme-rdma: correctly check for target keyed sgl support (bsc#1099041)
- nvme-rdma: do not override opts->queue_size (bsc#1099041)
- nvme-rdma: fix error flow during mapping request data (bsc#1099041)
- nvme-rdma: fix possible double free condition when failing to create a controller (bsc#1099041)
- nvme.h: add AEN configuration symbols (bsc#1054245)
- nvme.h: add ANA definitions (bsc#1054245)
- nvme.h: add support for the log specific field (bsc#1054245)
- nvme.h: add the changed namespace list log (bsc#1054245)
- nvme.h: untangle AEN notice definitions (bsc#1054245)
- nvme/multipath: Disable runtime writable enabling parameter (bsc#1054245)
- nvme/multipath: Fix multipath disabled naming collisions (bsc#1098706)
- nvme: Fix sync controller reset return (bsc#1077989)
- nvme: Revert 'nvme: mark nvme_queue_scan static' (bsc#1054245)
- nvme: Set integrity flag for user passthrough commands (bsc#1098706)
- nvme: Skip checking heads without namespaces (bsc#1098706)
- nvme: Use admin command effects for admin commands (bsc#1098706)
- nvme: add ANA support (bsc#1054245)
- nvme: add bio remapping tracepoint (bsc#1054245)
- nvme: allow duplicate controller if prior controller being deleted (bsc#1098706)
- nvme: centralize ctrl removal prints (bsc#1054245)
- nvme: check return value of init_srcu_struct function (bsc#1098706)
- nvme: cleanup double shift issue (bsc#1054245)
- nvme: do not enable AEN if not supported (bsc#1077989)
- nvme: do not hold nvmf_transports_rwsem for more than transport lookups (bsc#1054245)
- nvme: do not rely on the changed namespace list log (bsc#1054245)
- nvme: enforce 64bit offset for nvme_get_log_ext fn (bsc#1054245)
- nvme: expand nvmf_check_if_ready checks (bsc#1098706)
- nvme: fix NULL pointer dereference in nvme_init_subsystem (bsc#1098706)
- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD
- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD (,)
- nvme: fix potential memory leak in option parsing (bsc#1098706)
- nvme: fix use-after-free in nvme_free_ns_head (bsc#1054245)
- nvme: guard additional fields in nvme command structures (bsc#1054245)
- nvme: host: core: fix precedence of ternary operator (bsc#1054245)
- nvme: if_ready checks to fail io to deleting controller (bsc#1077989)
- nvme: implement log page low/high offset and dwords (bsc#1054245)
- nvme: kABI fix for ANA support in nvme_ctrl (bsc#1054245)
- nvme: kABI fixes for nvmet_ctrl (bsc#1054245)
- nvme: kabi fixes for nvme_ctrl (bsc#1054245)
- nvme: make nvme_get_log_ext non-static (bsc#1054245)
- nvme: mark nvme_queue_scan static (bsc#1054245)
- nvme: move init of keep_alive work item to controller initialization (bsc#1098706)
- nvme: partially revert 'nvme: remove nvme_req_needs_failover' (bsc#1054245)
- nvme: reintruduce nvme_get_log_ext() (bsc#1054245)
- nvme: remove nvme_req_needs_failover (bsc#1054245)
- nvme: simplify the API for getting log pages (bsc#1054245)
- nvme: submit AEN event configuration on startup (bsc#1054245)
- nvme: use the changed namespaces list log to clear ns data changed AENs (bsc#1054245)
- nvmet-fc: fix target sgl list on large transfers
- nvmet-fc: fix target sgl list on large transfers (,)
- nvmet-fc: increase LS buffer count per fc port (bsc#1098706)
- nvmet: Revert 'nvmet: constify struct nvmet_fabrics_ops' (bsc#1054245)
- nvmet: add AEN configuration support (bsc#1054245)
- nvmet: add a new nvmet_zero_sgl helper (bsc#1054245)
- nvmet: add minimal ANA support (bsc#1054245)
- nvmet: constify struct nvmet_fabrics_ops (bsc#1054245)
- nvmet: filter newlines from user input (bsc#1054245)
- nvmet: fixup crash on NULL device path (bsc#1054245)
- nvmet: implement the changed namespaces log (bsc#1054245)
- nvmet: kABI fixes for ANA support (bsc#1054245)
- nvmet: keep a port pointer in nvmet_ctrl (bsc#1054245)
- nvmet: mask pending AENs (bsc#1054245)
- nvmet: reset keep alive timer in controller enable (bsc#1054245)
- nvmet: return all zeroed buffer when we can't find an active namespace (bsc#1054245)
- nvmet: split log page implementation (bsc#1054245)
- nvmet: support configuring ANA groups (bsc#1054245)
- nvmet: switch loopback target state to connecting when resetting (bsc#1098706)
- nvmet: track and limit the number of namespaces per subsystem (1054245)
- nvmet: use Retain Async Event bit to clear AEN (bsc#1054245)
- of/pci: Fix theoretical NULL dereference (bsc#1051510)
- of: Make of_fwnode_handle() safer (bsc#1098633)
- of: fix DMA mask generation (bsc#1051510)
- of: overlay: validate offset from property fixups (bsc#1051510)
- of: platform: stop accessing invalid dev in of_platform_device_destroy (bsc#1051510)
- of: restrict DMA configuration (bsc#1051510)
- of: unittest: for strings, account for trailing \0 in property length field (bsc#1051510)
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (networking-stable-18_05_15)
- p54: do not unregister leds when they are not initialized (bsc#1051510)
- packet: fix bitfield update race (networking-stable-18_04_26)
- pci: Account for all bridges on bus when distributing bus numbers (bsc#1100132)
- pci: Add ACS quirk for Intel 300 series (bsc#1051510)
- pci: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510)
- pci: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510)
- pci: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510)
- pci: Restore config space on runtime resume despite being unbound (bsc#1051510)
- pci: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510)
- pci: aardvark: Fix pcie Max Read Request Size setting (bsc#1051510)
- pci: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510)
- pci: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510)
- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1051510)
- pci: dwc: Fix enumeration end when reaching root subordinate (bsc#1100132)
- pci: endpoint: Fix kernel panic after put_device() (bsc#1051510)
- pci: endpoint: Populate func_no before calling pci_epc_add_epf() (bsc#1051510)
- pci: exynos: Fix a potential init_clk_resources NULL pointer dereference (bsc#1051510)
- pci: faraday: Fix of_irq_get() error check (bsc#1051510)
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1051510)
- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510)
- pci: shpchp: Fix AMD POGO identification (bsc#1051510)
- perf intel-pt: Always set no branch for dummy event (bsc#1087217)
- perf intel-pt: Set no_aux_samples for the tracking event (bsc#1087217)
- perf/x86/intel/uncore: Add event constraint for BDX PCU (bsc#1087202)
- perf/x86/intel/uncore: Fix SKX CHA event extra regs (bsc#1087233)
- perf/x86/intel/uncore: Fix Skylake UPI PMU event masks (bsc#1087233)
- perf/x86/intel/uncore: Fix Skylake server CHA LLC_LOOKUP event umask (bsc#1087233)
- perf/x86/intel/uncore: Fix Skylake server PCU PMU event format (bsc#1087233)
- perf/x86/intel/uncore: Fix missing marker for skx_uncore_cha_extra_regs (bsc#1087233)
- perf/x86/intel/uncore: Remove invalid Skylake server CHA filter field (bsc#1087233)
- perf/x86: Fix data source decoding for Skylake
- phy: add sgmii and 10gkr modes to the phy_mode enum (bsc#1098633)
- pinctrl/amd: Fix build dependency on pinmux code (bsc#1051510)
- pinctrl/amd: save pin registers over suspend/resume (bsc#1051510)
- pinctrl: adi2: Fix Kconfig build problem (bsc#1051510)
- pinctrl: armada-37xx: Fix direction_output() callback behavior (bsc#1051510)
- pinctrl: artpec6: dt: add missing pin group uart5nocts (bsc#1051510)
- pinctrl: bcm2835: Avoid warning from __irq_do_set_handler (bsc#1051510)
- pinctrl: imx: fix debug message for SHARE_MUX_CONF_REG case (bsc#1051510)
- pinctrl: intel: Initialize GPIO properly when used through irqchip (bsc#1087092)
- pinctrl: intel: Read back TX buffer state (bsc#1051510)
- pinctrl: meson-gxbb: remove non-existing pin GPIOX_22 (bsc#1051510)
- pinctrl: meson-gxl: Fix typo in AO I2S pins (bsc#1051510)
- pinctrl: meson-gxl: Fix typo in AO SPDIF pins (bsc#1051510)
- pinctrl: mvebu: use correct MPP sel value for dev pins (bsc#1051510)
- pinctrl: nand: meson-gxbb: fix missing data pins (bsc#1051510)
- pinctrl: nsp: Fix potential NULL dereference (bsc#1051510)
- pinctrl: nsp: off by ones in nsp_pinmux_enable() (bsc#1100132)
- pinctrl: pinctrl-single: Fix pcs_request_gpio() when bits_per_mux != 0 (bsc#1051510)
- pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510)
- pinctrl: rockchip: enable clock when reading pin direction register (bsc#1051510)
- pinctrl: samsung: Fix NULL pointer exception on external interrupts on S3C24xx (bsc#1051510)
- pinctrl: samsung: Fix invalid register offset used for Exynos5433 external interrupts (bsc#1051510)
- pinctrl: sh-pfc: r8a7790: Add missing TX_ER pin to avb_mii group (bsc#1051510)
- pinctrl: sh-pfc: r8a7795-es1: Fix MOD_SEL1 bit[25:24] to 0x3 when using STP_ISEN_1_D (bsc#1051510)
- pinctrl: sh-pfc: r8a7795: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510)
- pinctrl: sh-pfc: r8a7795: Fix to delete A20..A25 pins function definitions (bsc#1051510)
- pinctrl: sh-pfc: r8a7796: Fix IPSR and MOD_SEL register pin assignment for NDFC pins group (bsc#1051510)
- pinctrl: sh-pfc: r8a7796: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510)
- pinctrl: sh-pfc: r8a7796: Fix to delete A20..A25 pins function definitions (bsc#1051510)
- pinctrl: sh-pfc: r8a7796: Fix to delete FSCLKST pin and IPSR7 bit[15:12] register definitions (bsc#1051510)
- pinctrl: sunxi: Fix A64 UART mux value (bsc#1051510)
- pinctrl: sunxi: Fix A80 interrupt pin bank (bsc#1051510)
- pinctrl: sunxi: fix V3s pinctrl driver IRQ bank base (bsc#1051510)
- pinctrl: sunxi: fix wrong irq_banks number for H5 pinctrl (bsc#1051510)
- pinctrl: sx150x: Add a static gpio/pinctrl pin range mapping (bsc#1051510)
- pinctrl: sx150x: Register pinctrl before adding the gpiochip (bsc#1051510)
- pinctrl: sx150x: Unregister the pinctrl on release (bsc#1051510)
- pinctrl: uniphier: fix members of rmii group for Pro4 (bsc#1051510)
- pinctrl: uniphier: fix pin_config_get() for input-enable (bsc#1051510)
- pipe: fix off-by-one error when checking buffer limits (bsc#1051510)
- pktcdvd: Fix a recently introduced NULL pointer dereference (bsc#1099918)
- pktcdvd: Fix pkt_setup_dev() error path (bsc#1099918)
- platform/chrome: cros_ec_lpc: remove redundant pointer request (bsc#1051510)
- platform/x86: asus-wmi: Fix NULL pointer dereference (bsc#1051510)
- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too (bsc#1098626)
- pm/core: Fix supplier device runtime PM usage counter imbalance (bsc#1051510)
- pm/hibernate: Fix oops at snapshot_write() (bsc#1051510)
- pm/hibernate: Use CONFIG_HAVE_SET_MEMORY for include condition (bsc#1051510)
- pm/wakeup: Only update last time for active wakeup sources (bsc#1051510)
- power: gemini-poweroff: Avoid spurious poweroff (bsc#1051510)
- power: supply: act8945a_charger: fix of_irq_get() error check (bsc#1051510)
- power: supply: cpcap-charger: add OMAP_usb2 dependency (bsc#1051510)
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382)
- powerpc/64s: Clear PCR on boot (bnc#1012382)
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244)
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041)
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382)
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382)
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382)
- powerpc/mm: Fix thread_pkey_regs_init() (, bsc#1078248, git-fixes)
- powerpc/mm: Fix thread_pkey_regs_init() (bsc#1078248, git-fixes)
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382)
- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (, bsc#1078248, git-fixes)
- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (bsc#1078248, git-fixes)
- powerpc/pkeys: Drop private VM_PKEY definitions (, bsc#1078248)
- powerpc/pkeys: Drop private VM_PKEY definitions (bsc#1078248)
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382)
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382)
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382)
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382)
- powerpc/ptrace: Fix enforcement of DAWR constraints (bsc#1099918)
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382)
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382)
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244)
- powerpc: mmu_context: provide old version of mm_iommu_ua_to_hpa (bsc#1077761, git-fixes)
- ppp: avoid loop in xmit recursion detection code (networking-stable-18_03_28)
- ppp: prevent unregistered channels from connecting to PPP units (networking-stable-18_03_07)
- ppp: unlock all_ppp_mutex before registering device (networking-stable-18_01_28)
- pppoe: check sockaddr length in pppoe_connect() (networking-stable-18_04_26)
- pppoe: take ->needed_headroom of lower device into account on xmit (networking-stable-18_01_28)
- pptp: remove a buggy dst release in pptp_connect() (networking-stable-18_04_10)
- printk: fix possible reuse of va_list variable (bsc#1100602)
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652)
- pty: cancel pty slave port buf's work in tty_release (bsc#1051510)
- pwm: lpss: platform: Save/restore the ctrl register over a suspend/resume (bsc#1051510)
- pwm: meson: Fix allocation of PWM channel array (bsc#1051510)
- pwm: meson: Improve PWM calculation precision (bsc#1051510)
- pwm: rcar: Fix a condition to prevent mismatch value setting to duty (bsc#1051510)
- pwm: stm32: Enforce dependency on CONFIG_MFD_STM32_TIMERS (bsc#1051510)
- pwm: stm32: Remove unused struct device (bsc#1051510)
- pwm: stmpe: Fix wrong register offset for hwpwm=2 case (bsc#1051510)
- pwm: tiehrpwm: Fix runtime PM imbalance at unbind (bsc#1051510)
- pwm: tiehrpwm: fix clock imbalance in probe error path (bsc#1051510)
- qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301)
- qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301)
- qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301)
- qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Advance drivers' version to 8.33.0.20 (bsc#1086314)
- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301)
- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add sanity check for SIMD fastpath handler (bsc#1050536)
- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536)
- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536)
- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536)
- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536)
- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536)
- qed: Fix mask for physical address in ILT entry (networking-stable-18_06_08)
- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix possible memory leak in Rx error path handling (bsc#1050536)
- qed: Fix possible memory leak in Rx error path handling (bsc#1050536)
- qed: Fix possible race for the link state value (bsc#1050536)
- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix reading stale configuration information (bsc#1086314)
- qed: Fix setting of incorrect eswitch mode (bsc#1050536)
- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Fix use of incorrect size in memcpy call (bsc#1050536)
- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536)
- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536)
- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Remove unused data member 'is_mf_default' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Remove unused data member 'is_mf_default' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: fix spelling mistake: 'checksumed' -> 'checksummed' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: fix spelling mistake: 'checksumed' -> 'checksummed' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: fix spelling mistake: 'offloded' -> 'offloaded' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: fix spelling mistake: 'offloded' -> 'offloaded' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: fix spelling mistake: 'taskelt' -> 'tasklet' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: fix spelling mistake: 'taskelt' -> 'tasklet' (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301)
- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538)
- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538)
- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086314 bsc#1086313 bsc#1086301)
- qede: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086314 bsc#1086313 bsc#1086301)
- qedr: Fix spelling mistake: 'hanlde' -> 'handle' (bsc#1086314 bsc#1086313 bsc#1086301)
- qedr: Fix spelling mistake: 'hanlde' -> 'handle' (bsc#1086314 bsc#1086313 bsc#1086301)
- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301)
- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301)
- qlogic: check kstrtoul() for errors (bsc#1050540)
- qmi_wwan: Add support for Quectel EP06 (networking-stable-18_02_06)
- qmi_wwan: add support for Quectel EG91 (bsc#1051510)
- qmi_wwan: add support for the Dell Wireless 5821e module (bsc#1051510)
- qmi_wwan: fix interface number for DW5821e production firmware (bsc#1051510)
- qmi_wwan: set FLAG_SEND_ZLP to avoid network initiated disconnect (bsc#1051510)
- r8152: fix tx packets accounting (bsc#1051510)
- r8152: napi hangup fix after disconnect (bsc#1051510)
- r8169: Be drop monitor friendly (bsc#1051510)
- rbd: flush rbd_dev->watch_dwork after watch is unregistered (bsc#1103216)
- rdma/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283)
- rdma/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283)
- rdma/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283)
- rdma/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283)
- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306)
- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306)
- rdma/cma: Fix use after destroy access to net namespace for IPoIB (bsc#1046306)
- rdma/cma: Fix use after destroy access to net namespace for IPoIB (bsc#1046306)
- rdma/cxgb4: Use structs to describe the uABI instead of opencoding (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- rdma/cxgb4: release hw resources on device removal (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659)
- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659)
- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659)
- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659)
- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307)
- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307)
- rdma/iwpm: fix memory leak on map_info (bsc#1046306)
- rdma/mlx4: Discard unknown SQP work requests (bsc#1046302)
- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305)
- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305)
- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305)
- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305)
- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305)
- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305)
- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305)
- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305)
- rdma/mlx5: Protect from shift operand overflow (bsc#1046305)
- rdma/mlx5: Use proper spec flow label type (bsc#1046305)
- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301)
- rdma/ucma: Do not allow setting rdma_OPTION_IB_PATH without an rdma device (bsc#1046306)
- rdma/ucma: Do not allow setting rdma_OPTION_IB_PATH without an rdma device (bsc#1046306)
- rdma/ucma: ucma_context reference leak in error path (bsc#1046306)
- rdma/ucma: ucma_context reference leak in error path (bsc#1046306)
- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306)
- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306)
- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306)
- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306)
- rds: MP-RDS may use an invalid c_path (networking-stable-18_04_13)
- rds: do not leak kernel memory to user land (networking-stable-18_05_15)
- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099029)
- regulator: max8998: Fix platform data retrieval (bsc#1051510)
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bsc#1051510)
- regulator: qcom_spmi: Include offset when translating voltages (bsc#1051510)
- regulator: tps65218: Fix strobe assignment (bsc#1051510)
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599)
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340)
- rocker: fix possible null pointer dereference in rocker_router_fib_event_work (networking-stable-18_02_06)
- route: check sysctl_fib_multipath_use_neigh earlier than hash (networking-stable-18_04_10)
- rpm/config.sh: Use SUSE:SLE-15:Update project instead of GA
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far
- rpm/kernel-source.changes.old: Add pre-SLE15 history (bsc#1098995)
- rpm/kernel-source.spec.in: Add more stuff to Recommends ... and move bc to Recommends as well. All these packages are needed for building a kernel manually from scratch with kernel-source files
- rpm/kernel-source.spec.in: require bc for kernel-source This is needed for building include/generated/timeconst.h from kernel/time/timeconst.bc
- rpm: ignore CONFIG_GCC_VERSION when checking for oldconfig changes Since 4.18-rc1, 'make oldconfig' writes gcc version and capabilities into generated .config. Thus whenever we build the package or run checks with different gcc version than used to update config/*/*, check for 'outdated configs' fails. As a quick band-aid, omit the lines with CONFIG_GCC_VERSION from both configs before comparing them. This way, the check won't fail unless run with newer gcc which would add new capabilities. More robust solution will require a wider discussion
- rtc: ac100: Fix ac100 determine rate bug (bsc#1051510)
- rtc: hctosys: Ensure system time does not overflow time_t (bsc#1051510)
- rtc: pxa: fix probe function (bsc#1051510)
- rtc: snvs: Fix usage of snvs_rtc_enable (bsc#1051510)
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bsc#1051510)
- rtlwifi: Fix kernel Oops 'Fw download fail!!' (bsc#1051510)
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bsc#1051510)
- rtnetlink: validate attributes in do_setlink() (networking-stable-18_06_08)
- rxrpc: Fix send in rxrpc_send_data_packet() (networking-stable-18_03_07)
- s390/crc32-vx: use expoline for indirect branches (git-fixes f19fbd5ed6)
- s390/ftrace: use expoline for indirect branches (git-fixes f19fbd5ed6)
- s390/gs: add compat regset for the guarded storage broadcast control block (git-fixes e525f8a6e696)
- s390/kernel: use expoline for indirect branches (git-fixes f19fbd5ed6)
- s390/lib: use expoline for indirect branches (git-fixes f19fbd5ed6)
- s390/qdio: do not merge ERROR output buffers (bsc#1099715)
- s390/qdio: do not retry EQBS after CCQ 96 (bsc#1102088, LTC#169699)
- s390/qeth: do not dump control cmd twice (bsc#1099715)
- s390/qeth: fix IPA command submission race (bsc#1099715)
- s390/qeth: fix IPA command submission race (networking-stable-18_03_07)
- s390/qeth: fix error handling in adapter command callbacks (bsc#1102088, LTC#169699)
- s390/qeth: fix overestimated count of buffer elements (bsc#1099715)
- s390/qeth: fix overestimated count of buffer elements (networking-stable-18_03_07)
- s390/qeth: fix race when setting MAC address (bnc#1093148, LTC#167307)
- s390/qeth: free netdevice when removing a card (bsc#1099715)
- s390/qeth: free netdevice when removing a card (networking-stable-18_03_28)
- s390/qeth: lock read device while queueing next buffer (bsc#1099715)
- s390/qeth: lock read device while queueing next buffer (networking-stable-18_03_28)
- s390/qeth: when thread completes, wake up all waiters (bsc#1099715)
- s390/qeth: when thread completes, wake up all waiters (networking-stable-18_03_28)
- s390: Correct register corruption in critical section cleanup (git-fixes 6dd85fbb87)
- s390: add assembler macros for CPU alternatives (git-fixes f19fbd5ed6)
- s390: correct module section names for expoline code revert (git-fixes f19fbd5ed6)
- s390: extend expoline to BC instructions (git-fixes, bsc#1103421)
- s390: move expoline assembler macros to a header (git-fixes f19fbd5ed6)
- s390: move spectre sysfs attribute code (bsc#1090098)
- s390: optimize memset implementation (git-fixes f19fbd5ed6)
- s390: remove indirect branch from do_softirq_own_stack (git-fixes f19fbd5ed6)
- s390: use expoline thunks in the BPF JIT (git-fixes, bsc#1103421)
- sch_netem: fix skb leak in netem_enqueue() (networking-stable-18_03_28)
- sched/core: Optimize ttwu_stat() (bnc#1101669 optimise numa balancing for fast migrate)
- sched/core: Optimize update_stats_*() (bnc#1101669 optimise numa balancing for fast migrate)
- scripts/dtc: fix '%zx' warning (bsc#1051510)
- scripts/gdb/linux/tasks.py: fix get_thread_info (bsc#1051510)
- scripts/git_sort/git_sort.py: Add 'nvme-4.18' to the list of repositories
- scripts/git_sort/git_sort.py: add modules-next tree
- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bsc#1051510)
- scsi: Revert 'scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()' (bsc#1099918)
- scsi: aacraid: Correct hba_send to include iu_type (bsc#1077989)
- scsi: core: clean up generated file scsi_devinfo_tbl.c (bsc#1077989)
- scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte() (bsc#1099918)
- scsi: cxgb4i: silence overflow warning in t4_uld_rx_handler() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961)
- scsi: ipr: new IOASC update (bsc#1097961)
- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088866)
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1088866)
- scsi: lpfc: Comment cleanup regarding Broadcom copyright header (bsc#1088866)
- scsi: lpfc: Correct fw download error message (bsc#1088866)
- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088866)
- scsi: lpfc: Correct target queue depth application changes (bsc#1088866)
- scsi: lpfc: Driver NVME load fails when CPU cnt > WQ resource cnt (bsc#1088866)
- scsi: lpfc: Enhance log messages when reporting CQE errors (bsc#1088866)
- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088866)
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1093290)
- scsi: lpfc: Fix Abort request WQ selection (bsc#1088866)
- scsi: lpfc: Fix MDS diagnostics failure (bsc#1088866)
- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088866)
- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088866)
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1088866)
- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088866)
- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088866)
- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088866)
- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088866)
- scsi: lpfc: Fix port initialization failure (bsc#1093290)
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1088866)
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1088866)
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1088866)
- scsi: lpfc: enhance LE data structure copies to hardware (bsc#1088866)
- scsi: lpfc: fix spelling mistakes: 'mabilbox' and 'maibox' (bsc#1088866)
- scsi: lpfc: update driver version to 12.0.0.2 (bsc#1088866)
- scsi: lpfc: update driver version to 12.0.0.3 (bsc#1088866)
- scsi: lpfc: update driver version to 12.0.0.4 (bsc#1088866)
- scsi: megaraid_sas: Do not log an error if FW successfully initializes (bsc#1077989)
- scsi: qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1077989)
- scsi: qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1077338)
- scsi: sg: mitigate read/write abuse (bsc#1101296)
- scsi: target: fix crash with iscsi target and dvd (bsc#1099918)
- scsi: zfcp: fix infinite iteration on ERP ready list (bsc#1102088, LTC#169699)
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bsc#1102088, LTC#169699)
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bsc#1102088, LTC#169699)
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bsc#1102088, LTC#169699)
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bsc#1102088, LTC#169699)
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bsc#1102088, LTC#169699)
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bsc#1102088, LTC#169699)
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bsc#1102088, LTC#169699)
- sctp: delay the authentication for the duplicated cookie-echo chunk (networking-stable-18_05_15)
- sctp: do not check port in sctp_inet6_cmp_addr (networking-stable-18_04_26)
- sctp: do not leak kernel memory to user space (networking-stable-18_04_10)
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (networking-stable-18_03_07)
- sctp: fix the issue that the cookie-ack with auth can't get processed (networking-stable-18_05_15)
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (git-fixes)
- sctp: not allow transport timeout value less than HZ/5 for hb_timer (networking-stable-18_06_08)
- sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg (networking-stable-18_05_15)
- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (networking-stable-18_04_10)
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (networking-stable-18_05_15)
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bsc#1051510)
- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bsc#1051510)
- selinux: skip bounded transition processing if the policy isn't loaded (bsc#1051510)
- serdev: fix memleak on module unload (bsc#1051510)
- serial: 8250: omap: Fix idling of clocks for unused uarts (bsc#1051510)
- serial: altera: ensure port->regshift is honored consistently (bsc#1051510)
- serial: arc_uart: Fix out-of-bounds access through DT alias (bsc#1051510)
- serial: earlycon: Only try fdt when specify 'earlycon' exactly (bsc#1051510)
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bsc#1051510)
- serial: imx: Fix out-of-bounds access through serial port index (bsc#1051510)
- serial: imx: drop if that always evaluates to true (bsc#1051510)
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bsc#1051510)
- serial: pxa: Fix out-of-bounds access through serial port index (bsc#1051510)
- serial: samsung: Fix out-of-bounds access through serial port index (bsc#1051510)
- serial: samsung: fix maxburst parameter for DMA transactions (bsc#1051510)
- serial: sh-sci: Fix out-of-bounds access through DT alias (bsc#1051510)
- serial: sh-sci: Stop using printk format %pCr (bsc#1051510)
- serial: sh-sci: Update warning message in sci_request_dma_chan() (bsc#1051510)
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bsc#1051510)
- serial: sirf: Fix out-of-bounds access through DT alias (bsc#1051510)
- serial: xuartps: Fix out-of-bounds access through DT alias (bsc#1051510)
- series.conf: Sort scheduler stats optimisations
- sfc: stop the TX queue before pushing new buffers (bsc#1058169)
- skbuff: Fix not waking applications when errors are enqueued (networking-stable-18_03_28)
- slip: Check if rstate is initialized before uncompressing (networking-stable-18_04_13)
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1051510)
- smsc75xx: fix smsc75xx_set_features() (bsc#1051510)
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1051510)
- soc/fsl/qbman: fix issue in qman_delete_cgr_safe() (networking-stable-18_03_28)
- socket: close race condition between sock_close() and sockfs_setattr() (networking-stable-18_06_20)
- soreuseport: fix mem leak in reuseport_add_sock() (networking-stable-18_02_06)
- spi: bcm-qspi: fIX some error handling paths (bsc#1051510)
- spi: core: Fix devm_spi_register_master() function name in kerneldoc (bsc#1051510)
- spi: pxa2xx: Do not touch CS pin until we have a transfer pending (bsc#1051510)
- spi: sh-msiof: Fix bit field overflow writes to TSCR/RSCR (bsc#1051510)
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bsc#1051510)
- staging: fbtft: array underflow in fbtft_request_gpios_match() (bsc#1051510)
- staging: iio: ade7759: fix signed extension bug on shift of a u8 (bsc#1051510)
- staging: rtl8723bs: Prevent an underflow in rtw_check_beacon_data() (bsc#1051510)
- staging: rtl8723bs: add missing range check on id (bsc#1051510)
- staging: rtl8723bs: fix u8 less than zero check (bsc#1051510)
- staging: rts5208: Fix 'seg_no' calculation in reset_ms_card() (bsc#1051510)
- staging: sm750fb: Fix parameter mistake in poke32 (bsc#1051510)
- staging:iio:ade7854: Fix error handling on read/write (bsc#1051510)
- staging:iio:ade7854: Fix the wrong number of bits to read (bsc#1051510)
- stm class: Fix a use-after-free (bsc#1051510)
- stm class: Use vmalloc for the master map (bsc#1051510)
- strparser: Do not call mod_delayed_work with a timeout of LONG_MAX (networking-stable-18_04_26)
- strparser: Fix incorrect strp->need_bytes value (networking-stable-18_04_26)
- strparser: Fix sign of err codes (networking-stable-18_04_10)
- sunrpc: remove incorrect HMAC request initialization (bsc#1051510)
- swap: divide-by-zero when zero length swap file on ssd (bsc#1051510)
- tcp: do not read out-of-bounds opsize (networking-stable-18_04_26)
- tcp: ignore Fast Open on repair mode (networking-stable-18_05_15)
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (networking-stable-18_04_26)
- tcp: release sk_frag.page in tcp_disconnect (networking-stable-18_02_06)
- tcp: revert F-RTO extension to detect more spurious timeouts (networking-stable-18_03_07)
- tcp: verify the checksum of the first data segment in a new connection (networking-stable-18_06_20)
- tcp_bbr: fix to zero idle_restart only upon S/ACKed data (networking-stable-18_05_15)
- team: Fix double free in error path (networking-stable-18_03_28)
- team: avoid adding twice the same option to the event list (networking-stable-18_04_26)
- team: fix netconsole setup over team (networking-stable-18_04_26)
- team: move dev_mc_sync after master_upper_dev_link in team_port_add (networking-stable-18_04_10)
- team: use netdev_features_t instead of u32 (networking-stable-18_06_08)
- tee: check shm references are consistent in offset/size (bsc#1051510)
- tee: shm: fix use-after-free via temporarily dropped reference (bsc#1051510)
- test_firmware: fix missing unlock on error in config_num_requests_store() (bsc#1051510)
- test_firmware: fix setting old custom fw path back on exit (bsc#1051510)
- test_firmware: fix setting old custom fw path back on exit, second try (bsc#1051510)
- tg3: APE heartbeat changes (bsc#1086286)
- tg3: Add Macronix NVRAM support (bsc#1086286)
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286)
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286)
- tg3: prevent scheduling while atomic splat (bsc#1086286)
- thermal/drivers/hisi: Fix kernel panic on alarm interrupt (bsc#1051510)
- thermal/drivers/hisi: Fix missing interrupt enablement (bsc#1051510)
- thermal/drivers/hisi: Fix multiple alarm interrupts firing (bsc#1051510)
- thermal/drivers/hisi: Simplify the temperature/step computation (bsc#1051510)
- thermal: bcm2835: Stop using printk format %pCr (bsc#1051510)
- thermal: bcm2835: fix an error code in probe() (bsc#1051510)
- thermal: exynos: Propagate error value from tmu_read() (bsc#1051510)
- thermal: exynos: Reading temperature makes sense only when TMU is turned on (bsc#1051510)
- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bsc#1051510)
- thermal: int3400_thermal: fix error handling in int3400_thermal_probe() (bsc#1051510)
- thermal: int3403_thermal: Fix NULL pointer deref on module load / probe (bsc#1051510)
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bsc#1051510)
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#1099918)
- timekeeping: Use proper timekeeper for debug code (bsc#1051510)
- tipc: add policy for TIPC_NLA_NET_ADDR (networking-stable-18_04_26)
- tipc: fix a memory leak in tipc_nl_node_get_link() (networking-stable-18_01_28)
- tools lib traceevent: Fix get_field_str() for dynamic strings (bsc#1051510)
- tools lib traceevent: Simplify pointer print logic and fix %pF (bsc#1051510)
- tools/lib/lockdep: Define the ARRAY_SIZE() macro (bsc#1051510)
- tools/lib/lockdep: Fix undefined symbol prandom_u32 (bsc#1051510)
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bsc#1051510)
- tools/power turbostat: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1051510)
- tools/thermal: tmon: fix for segfault (bsc#1051510)
- tools/usbip: fixes build with musl libc toolchain (bsc#1051510)
- tracing/uprobe_event: Fix strncpy corner case (bsc#1099918)
- tracing: Fix converting enum's from the map in trace_event_eval_update() (bsc#1099918)
- tracing: Fix missing tab for hwlat_detector print format (bsc#1099918)
- tracing: Kconfig text fixes for CONFIG_HWLAT_TRACER (bsc#1099918)
- tracing: Make the snapshot trigger work with instances (bsc#1099918)
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1099918)
- tty/serial: atmel: use port->name as name in request_irq() (bsc#1051510)
- tty: Avoid possible error pointer dereference at tty_ldisc_restore() (bsc#1051510)
- tty: Do not call panic() at tty_ldisc_init() (bsc#1051510)
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bsc#1051510)
- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bsc#1051510)
- tty: n_gsm: Fix DLCI handling for ADM mode if debug is not set (bsc#1051510)
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bsc#1051510)
- tty: pl011: Avoid spuriously stuck-off interrupts (bsc#1051510)
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bsc#1051510)
- ubifs: Fix data node size for truncating uncompressed nodes (bsc#1051510)
- ubifs: Fix potential integer overflow in allocation (bsc#1051510)
- ubifs: Fix uninitialized variable in search_dh_cookie() (bsc#1051510)
- ubifs: Fix unlink code wrt. double hash lookups (bsc#1051510)
- udp: fix rx queue len reported by diag and proc interface (networking-stable-18_06_20)
- usb-storage: Add compatibility quirk flags for G-Technologies G-Drive (bsc#1051510)
- usb-storage: Add support for FL_ALWAYS_SYNC flag in the UAS driver (bsc#1051510)
- usb/gadget: Fix 'high bandwidth' check in usb_gadget_ep_match_desc() (bsc#1051510)
- usb: Increment wakeup count on remote wakeup (bsc#1051510)
- usb: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bsc#1087092)
- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1051510)
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bsc#1051510)
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bsc#1051510)
- usb: cdc_acm: prevent race at write to acm while system resumes (bsc#1087092)
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1051510)
- usb: do not reset if a low-speed or full-speed device timed out (bsc#1051510)
- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1051510)
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bsc#1051510)
- usb: dwc2: Improve gadget state disconnection handling (bsc#1085539)
- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1051510)
- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1051510)
- usb: dwc2: hcd: Fix host channel halt flow (bsc#1051510)
- usb: dwc2: host: Fix transaction errors in host mode (bsc#1051510)
- usb: dwc3: Add SoftReset PHY synchonization delay (bsc#1051510)
- usb: dwc3: Fix GDBGFIFOSPACE_TYPE values (bsc#1051510)
- usb: dwc3: Makefile: fix link error on randconfig (bsc#1051510)
- usb: dwc3: Undo PHY init if soft reset fails (bsc#1051510)
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bsc#1051510)
- usb: dwc3: ep0: Reset TRB counter for ep0 IN (bsc#1051510)
- usb: dwc3: gadget: Fix list_del corruption in dwc3_ep_dequeue (bsc#1051510)
- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bsc#1051510)
- usb: dwc3: of-simple: fix use-after-free on remove (bsc#1051510)
- usb: dwc3: omap: do not miss events during suspend/resume (bsc#1051510)
- usb: dwc3: pci: Properly cleanup resource (bsc#1051510)
- usb: dwc3: prevent setting PRTCAP to OTG from debugfs (bsc#1051510)
- usb: gadget: bdc: 64-bit pointer capability check (bsc#1051510)
- usb: gadget: composite: fix incorrect handling of OS desc requests (bsc#1051510)
- usb: gadget: core: Fix use-after-free of usb_request (bsc#1051510)
- usb: gadget: dummy: fix nonsensical comparisons (bsc#1051510)
- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bsc#1051510)
- usb: gadget: f_fs: Only return delayed status when len is 0 (bsc#1051510)
- usb: gadget: f_fs: Process all descriptors during bind (bsc#1051510)
- usb: gadget: f_fs: Use config_ep_by_speed() (bsc#1051510)
- usb: gadget: f_mass_storage: Fix the logic to iterate all common->luns (bsc#1051510)
- usb: gadget: f_midi: fixing a possible double-free in f_midi (bsc#1051510)
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bsc#1051510)
- usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bsc#1051510)
- usb: gadget: f_uac2: fix error handling in afunc_bind (again) (bsc#1051510)
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bsc#1051510)
- usb: gadget: ffs: Let setup() return usb_GADGET_DELAYED_STATUS (bsc#1051510)
- usb: gadget: fsl_udc_core: fix ep valid checks (bsc#1051510)
- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bsc#1051510)
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bsc#1051510)
- usb: gadget: udc: core: update usb_ep_queue() documentation (bsc#1051510)
- usb: gadget: udc: renesas_usb3: disable the controller's irqs for reconnecting (bsc#1051510)
- usb: host: ehci: use correct device pointer for dma ops (bsc#1087092)
- usb: host: xhci-plat: revert 'usb: host: xhci-plat: enable clk in resume timing' (bsc#1051510)
- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bsc#1051510)
- usb: musb: Fix external abort in musb_remove on omap2430 (bsc#1051510)
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bsc#1051510)
- usb: musb: fix enumeration after resume (bsc#1051510)
- usb: musb: fix remote wakeup racing with suspend (bsc#1051510)
- usb: musb: gadget: misplaced out of bounds check (bsc#1051510)
- usb: musb: host: fix potential NULL pointer dereference (bsc#1051510)
- usb: musb: trace: fix NULL pointer dereference in musb_g_tx() (bsc#1051510)
- usb: option: Add support for FS040U modem (bsc#1087092)
- usb: quirks: add delay quirks for Corsair Strafe (bsc#1051510)
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1051510)
- usb: serial: cp210x: add CESINEL device ids (bsc#1051510)
- usb: serial: cp210x: add ELDAT Easywave RX09 id (bsc#1051510)
- usb: serial: cp210x: add ID for NI usb serial console (bsc#1051510)
- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bsc#1051510)
- usb: serial: cp210x: add another usb ID for Qivicon ZigBee stick (bsc#1051510)
- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bsc#1051510)
- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bsc#1051510)
- usb: serial: ftdi_sio: use jtag quirk for Arrow usb Blaster (bsc#1051510)
- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132)
- usb: serial: mos7840: fix status-register error handling (bsc#1051510)
- usb: serial: option: Add support for Quectel EP06 (bsc#1051510)
- usb: serial: option: adding support for ublox R410M (bsc#1051510)
- usb: serial: option: reimplement interface masking (bsc#1051510)
- usb: serial: simple: add libtransistor console (bsc#1051510)
- usb: serial: visor: handle potential invalid device configuration (bsc#1051510)
- usb: typec: ucsi: Fix for incorrect status data issue (bsc#1100132)
- usb: typec: ucsi: acpi: Workaround for cache mode issue (bsc#1100132)
- usb: yurex: fix out-of-bounds uaccess in read handler (bsc#1100132)
- usbip: Correct maximum value of CONFIG_usbIP_VHCI_HC_PORTS (bsc#1051510)
- usbip: usbip_event: fix to not print kernel pointer address (bsc#1051510)
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bsc#1051510)
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bsc#1051510)
- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1051510)
- userns: Do not fail follow_automount based on s_user_ns (bsc#1099918)
- vfb: fix video mode and line_length being set when loaded (bsc#1100362)
- vfio/pci: Fix potential Spectre v1 (bsc#1051510)
- vfio/spapr: Use IOMMU pageshift rather than pagesize (bsc#1077761, git-fixes)
- vfio: Use get_user_pages_longterm correctly (bsc#1095337)
- vfio: platform: Fix reset module leak in error path (bsc#1099918)
- vhost: Fix vhost_copy_to_user() (networking-stable-18_04_13)
- vhost: correctly remove wait queue during poll failure (networking-stable-18_04_10)
- vhost: fix vhost_vq_access_ok() log check (networking-stable-18_04_13)
- vhost: synchronize IOTLB message with dev cleanup (networking-stable-18_06_08)
- vhost: validate log when IOTLB is enabled (networking-stable-18_04_10)
- vhost_net: add missing lock nesting notation (networking-stable-18_04_10)
- vhost_net: stop device during reset owner (networking-stable-18_02_06)
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966)
- video/omap: add module license tags (bsc#1090888)
- video: remove unused kconfig SH_LCD_MIPI_DSI (bsc#1087092)
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bsc#1100382)
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bsc#1051510)
- virtio-net: correctly transmit XDP buff after linearizing (networking-stable-18_06_08)
- virtio-net: fix leaking page for gso packet during mergeable XDP (networking-stable-18_06_08)
- virtio-net: fix module unloading (bsc#1051510)
- virtio: add ability to iterate over vqs (bsc#1051510)
- virtio_console: do not tie bufs to a vq (bsc#1051510)
- virtio_console: drop custom control queue cleanup (bsc#1051510)
- virtio_console: free buffers after reset (bsc#1051510)
- virtio_console: move removal code (bsc#1051510)
- virtio_console: reset on out of memory (bsc#1051510)
- virtio_net: Disable interrupts if napi_complete_done rescheduled napi (bsc#1051510)
- virtio_net: fix XDP code path in receive_small() (bsc#1051510)
- virtio_net: fix adding vids on big-endian (networking-stable-18_04_26)
- virtio_net: split out ctrl buffer (networking-stable-18_04_26)
- virtio_ring: fix num_free handling in error case (bsc#1051510)
- vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi (networking-stable-18_04_26)
- vlan: also check phy_driver ts_info for vlan's real device (networking-stable-18_04_10)
- vmcore: add API to collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)
- vmw_balloon: fix inflation with batching (bsc#1051510)
- vmw_balloon: fixing double free when batching mode is off (bsc#1051510)
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860)
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860)
- vmxnet3: increase default rx ring sizes (bsc#1091860)
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860)
- vmxnet3: use DMA memory barriers where required (bsc#1091860)
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860)
- vrf: Fix use after free and double free in vrf_finish_output (networking-stable-18_04_10)
- vrf: check the original netdevice for generating redirect (networking-stable-18_06_08)
- vt: prevent leaking uninitialized data to userspace via /dev/vcs* (bsc#1051510)
- vti6: better validate user provided tunnel names (networking-stable-18_04_10)
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bsc#1051510)
- wait: add wait_event_killable_timeout() (bsc#1099792)
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843)
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843)
- watchdog: da9063: Fix updating timeout value (bsc#1100843)
- watchdog: f71808e_wdt: Fix magic close handling (bsc#1051510)
- watchdog: sp5100_tco: Fix watchdog disable bit (bsc#1051510)
- wlcore: add missing nvs file name info for wilink8 (bsc#1051510)
- x.509: unpack RSA signatureValue field from BIT STRING (bsc#1051510)
- x86/efi: Access EFI MMIO data as unencrypted when SEV is active (bsc#1099193)
- x86/pkeys: Add arch_pkeys_enabled() (, bsc#1078248)
- x86/pkeys: Add arch_pkeys_enabled() (bsc#1078248)
- x86/pkeys: Move vma_pkey() into asm/pkeys.h (, bsc#1078248)
- x86/pkeys: Move vma_pkey() into asm/pkeys.h (bsc#1078248)
- x86/stacktrace: Clarify the reliable success paths (bnc#1058115)
- x86/stacktrace: Do not fail for ORC with regs on stack (bnc#1058115)
- x86/stacktrace: Do not unwind after user regs (bnc#1058115)
- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder (bnc#1058115)
- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115)
- x86/unwind/orc: Detect the end of the stack (bnc#1058115)
- x86: Pass x86 as architecture on x86_64 and i386 (bsc#1093118)
- xen/grant-table: log the lack of grants (bnc#1085042)
- xhci: Add port status decoder for tracing purposes
- xhci: Fix kernel oops in trace_xhci_free_virt_device (bsc#1100132)
- xhci: Fix usb3 NULL pointer dereference at logical disconnect (bsc#1090888)
- xhci: Fix use-after-free in xhci_free_virt_device (bsc#1100132)
- xhci: Revert 'xhci: plat: Register shutdown for xhci_plat' (bsc#1090888)
- xhci: add definitions for all port link states
- xhci: add port speed ID to portsc tracing
- xhci: add port status tracing
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132)
- xprtrdma: Fix list corruption / DMAR errors during MR recovery (git-fixes)
- xprtrdma: Return -ENOBUFS when no pages are available (git-fixes)
Patchnames
SUSE-SLE-Module-Public-Cloud-15-2018-1505
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel-azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: A remote attacker even with relatively low bandwidth could have caused lots of CPU usage\n by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)\n- CVE-2017-18344: The timer_create syscall implementation didn\u0027t properly validate input,\n which could have lead to out-of-bounds access.\n This allowed userspace applications to read arbitrary kernel memory in some setups. (bsc#1102851)\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could\n have result in local attackers being able to crash the kernel or potentially\n elevate privileges because kmalloc_array is not used (bnc#1100418)\n- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a\n large relative timeout because ktime_add_safe was not used (bnc#1099924)\n- CVE-2018-13405: The inode_init_owner function allowed local users to create\n files with an unintended group ownership allowing attackers to escalate\n privileges by making a plain file executable and SGID (bnc#1100416)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution\n and branch prediction may have allowed unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis (bsc#1068032)\n- CVE-2018-1118: Linux kernel vhost did not properly initialize memory in\n messages passed between virtual guests and the host operating system. This\n could have allowed local privileged users to read some kernel memory contents\n when reading from the /dev/vhost-net device file (bsc#1092472)\n\nThe following non-security bugs were fixed:\n\n- 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510)\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15)\n- acpi / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510)\n- acpi / processor: Finish making acpi_processor_ppc_has_changed() void (bsc#1051510)\n- acpi / watchdog: properly initialize resources (bsc#1051510)\n- acpi, APEI, EINJ: Subtract any matching Register Region from Trigger resources (bsc#1051510)\n- acpi, nfit: Fix scrub idle detection (bsc#1094119)\n- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1051510)\n- acpi: Add helper for deactivating memory region (bsc#1100132)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bsc#1051510)\n- alsa: hda - Handle pm failure during hotplug (bsc#1051510)\n- alsa: hda/ca0132 - use ARRAY_SIZE (bsc#1051510)\n- alsa: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510)\n- alsa: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510)\n- alsa: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510)\n- alsa: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510)\n- alsa: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510)\n- alsa: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510)\n- alsa: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510)\n- alsa: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk (bsc#1051510)\n- alsa: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510)\n- alsa: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510)\n- alsa: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510)\n- alsa: hda/realtek - Yet another Clevo P950 quirk entry (bsc#1101143)\n- alsa: hda/realtek - two more lenovo models need fixup of MIC_LOCATION (bsc#1051510)\n- alsa: hda: add mute led support for HP ProBook 455 G5 (bsc#1051510)\n- alsa: rawmidi: Change resized buffers atomically (bsc#1051510)\n- alsa: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510)\n- alsa: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510)\n- alx: take rtnl before calling __alx_open from resume (bsc#1051510)\n- amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26)\n- amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26)\n- amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26)\n- amd-xgbe: Restore pci interrupt enablement setting on resume (networking-stable-18_03_07)\n- arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918)\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1103220)\n- arm: amba: Do not read past the end of sysfs \u0027driver_override\u0027 buffer (CVE-2018-9385,bsc#1100491)\n- arm: module: fix modsign build error (bsc#1093666)\n- arp: fix arp_filter on l3slave devices (networking-stable-18_04_10)\n- asoc: cirrus: i2s: Fix LRCLK configuration (bsc#1051510)\n- asoc: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510)\n- asoc: cs35l35: Add use_single_rw to regmap config (bsc#1051510)\n- asoc: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510)\n- asoc: mediatek: preallocate pages use platform device (bsc#1051510)\n- ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1051510)\n- atl1c: reserve min skb headroom (bsc#1051510)\n- audit: Fix wrong task in comparison of session ID (bsc#1051510)\n- audit: ensure that \u0027audit=1\u0027 actually enables audit for PID 1 (bsc#1051510)\n- audit: return on memory error to avoid null pointer dereference (bsc#1051510)\n- auxdisplay: fix broken menu (bsc#1051510)\n- auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510)\n- auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510)\n- b44: Initialize 64-bit stats seqcount (bsc#1051510)\n- backlight: as3711_bl: Fix Device Tree node leaks (bsc#1051510)\n- backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510)\n- backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1051510)\n- backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510)\n- backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510)\n- batman-adv: Accept only filled wifi station info (bsc#1051510)\n- batman-adv: Always initialize fragment header priority (bsc#1051510)\n- batman-adv: Avoid race in TT TVLV allocator helper (bsc#1051510)\n- batman-adv: Avoid storing non-TT-sync flags on singular entries too (bsc#1051510)\n- batman-adv: Fix TT sync flags for intermediate TT responses (bsc#1051510)\n- batman-adv: Fix bat_ogm_iv best gw refcnt after netlink dump (bsc#1051510)\n- batman-adv: Fix bat_v best gw refcnt after netlink dump (bsc#1051510)\n- batman-adv: Fix check of retrieved orig_gw in batadv_v_gw_is_eligible (bsc#1051510)\n- batman-adv: Fix debugfs path for renamed hardif (bsc#1051510)\n- batman-adv: Fix debugfs path for renamed softif (bsc#1051510)\n- batman-adv: Fix internal interface indices types (bsc#1051510)\n- batman-adv: Fix lock for ogm cnt access in batadv_iv_ogm_calc_tq (bsc#1051510)\n- batman-adv: Fix multicast packet loss with a single WANT_ALL_IPV4/6 flag (bsc#1051510)\n- batman-adv: Fix netlink dumping of BLA backbones (bsc#1051510)\n- batman-adv: Fix netlink dumping of BLA claims (bsc#1051510)\n- batman-adv: Fix skbuff rcsum on packet reroute (bsc#1051510)\n- batman-adv: Ignore invalid batadv_iv_gw during netlink send (bsc#1051510)\n- batman-adv: Ignore invalid batadv_v_gw during netlink send (bsc#1051510)\n- batman-adv: Use default throughput value on cfg80211 error (bsc#1051510)\n- batman-adv: fix TT sync flag inconsistencies (bsc#1051510)\n- batman-adv: fix header size check in batadv_dbg_arp() (bsc#1051510)\n- batman-adv: fix multicast-via-unicast transmission with AP isolation (bsc#1051510)\n- batman-adv: fix packet checksum in receive path (bsc#1051510)\n- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bsc#1051510)\n- batman-adv: invalidate checksum on fragment reassembly (bsc#1051510)\n- batman-adv: update data pointers after skb_cow() (bsc#1051510)\n- bfq: Re-enable auto-loading when built as a module (bsc#1099918)\n- blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918)\n- blk-mq: count allocated but not started requests in iostats inflight (bsc#1077989)\n- blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918)\n- blk-mq: fix sysfs inflight counter (bsc#1077989)\n- blk-mq: make sure hctx-\u003enext_cpu is set correctly (bsc#1099918)\n- blk-mq: make sure that correct hctx-\u003enext_cpu is set (bsc#1099918)\n- blk-mq: reinit q-\u003etag_set_list entry only after grace period (bsc#1099918)\n- blk-mq: simplify queue mapping; schedule with each possisble CPU (bsc#1099918)\n- block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918)\n- block, bfq: fix occurrences of request finish method\u0027s old name (bsc#1099918)\n- block/swim: Remove extra put_disk() call from error path (bsc#1099918)\n- block: Fix __bio_integrity_endio() documentation (bsc#1099918)\n- block: Fix cloning of requests with a special payload (bsc#1099918)\n- block: always set partition number to \u00270\u0027 in blk_partition_remap() (bsc#1054245)\n- block: always set partition number to \u00270\u0027 in blk_partition_remap() (bsc#1077989)\n- block: bio_check_eod() needs to consider partitions (bsc#1077989)\n- block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918)\n- block: factor out __blkdev_issue_zero_pages() (bsc#1099918)\n- block: fail op_is_write() requests to read-only partitions (bsc#1077989)\n- block: pass \u0027run_queue\u0027 to blk_mq_request_bypass_insert (bsc#1077989)\n- block: sed-opal: Fix a couple off by one bugs (bsc#1099918)\n- block: set request_list for request (bsc#1077989)\n- bluetooth: avoid recursive locking in hci_send_to_channel() (bsc#1051510)\n- bluetooth: hci_ll: Add support for the external clock (bsc#1051510)\n- bluetooth: hci_ll: Fix download_firmware() return when __hci_cmd_sync fails (bsc#1051510)\n- bluetooth: hci_nokia: select BT_HCIUART_H4 (bsc#1051510)\n- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510)\n- bluetooth: hci_uart: fix kconfig dependency (bsc#1051510)\n- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323)\n- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323)\n- bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323)\n- bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323)\n- bnx2x: Use NETIF_F_GRO_HW (bsc#1086323)\n- bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323)\n- bnx2x: fix slowpath null crash (bsc#1086323)\n- bnx2x: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086323)\n- bnx2x: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086323)\n- bnx2x: use the right constant (bsc#1086323)\n- bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282)\n- bnxt_en: Add IRQ remapping logic (bsc#1086282)\n- bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282)\n- bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282)\n- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282)\n- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282)\n- bnxt_en: Add extended port statistics support (bsc#1086282)\n- bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282)\n- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282)\n- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282)\n- bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282)\n- bnxt_en: Always forward VF MAC address to the PF (bsc#1086282)\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242)\n- bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242)\n- bnxt_en: Change IRQ assignment for rdma driver (bsc#1086282)\n- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282)\n- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282)\n- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282)\n- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282)\n- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282)\n- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282)\n- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282)\n- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282)\n- bnxt_en: Do not allow VF to read EEPROM (bsc#1086282)\n- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242)\n- bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242)\n- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282)\n- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282)\n- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282)\n- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282)\n- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282)\n- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282)\n- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282)\n- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282)\n- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282)\n- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282)\n- bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282)\n- bnxt_en: Fix firmware message delay loop regression (bsc#1086282)\n- bnxt_en: Fix for system hang if request_irq fails (bsc#1050242)\n- bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242)\n- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282)\n- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282)\n- bnxt_en: Fix the vlan_tci exact match check (bsc#1050242)\n- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282)\n- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282)\n- bnxt_en: Forward VF MAC address to the PF (bsc#1086282)\n- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282)\n- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282)\n- bnxt_en: Implement new method to reserve rings (bsc#1086282)\n- bnxt_en: Improve resource accounting for SRIOV (bsc#1086282)\n- bnxt_en: Improve ring allocation logic (bsc#1086282)\n- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282)\n- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282)\n- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282)\n- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282)\n- bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282)\n- bnxt_en: Need to include rdma rings in bnxt_check_rings() (bsc#1086282)\n- bnxt_en: Need to include rdma rings in bnxt_check_rings() (bsc#1086282)\n- bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282)\n- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282)\n- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282)\n- bnxt_en: Refactor bnxt_close_nic() (bsc#1086282)\n- bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282)\n- bnxt_en: Refactor hardware resource data structures (bsc#1086282)\n- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282)\n- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282)\n- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282)\n- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282)\n- bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282)\n- bnxt_en: Reserve completion rings and MSIX for bnxt_re rdma driver (bsc#1086282)\n- bnxt_en: Reserve completion rings and MSIX for bnxt_re rdma driver (bsc#1086282)\n- bnxt_en: Reserve resources for RFS (bsc#1086282)\n- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282)\n- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282)\n- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282)\n- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282)\n- bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282)\n- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282)\n- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282)\n- bnxt_en: Simplify ring alloc/free error messages (bsc#1086282)\n- bnxt_en: Support max-mtu with VF-reps (bsc#1086282)\n- bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282)\n- bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282)\n- bnxt_en: Use a dedicated VNIC mode for rdma (bsc#1086282)\n- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282)\n- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282)\n- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282)\n- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282)\n- bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282)\n- bonding: do not allow rlb updates to invalid mac (networking-stable-18_05_15)\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26)\n- bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10)\n- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10)\n- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10)\n- bonding: re-evaluate force_primary when the primary slave name changes (networking-stable-18_06_20)\n- bonding: send learning packets for vlans on slave (networking-stable-18_05_15)\n- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282)\n- bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15)\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457)\n- btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918)\n- bus: arm-cci: Fix use of smp_processor_id() in preemptible context (bsc#1051510)\n- bus: arm-ccn: Check memory allocation failure (bsc#1051510)\n- bus: arm-ccn: Fix use of smp_processor_id() in preemptible context (bsc#1051510)\n- bus: arm-ccn: fix module unloading Error: Removing state 147 which has instances left (bsc#1051510)\n- can: bcm: check for null sk before deferencing it via the call to sock_net (bsc#1051510)\n- can: hi311x: Acquire SPI lock on -\u003edo_get_berr_counter (bsc#1051510)\n- can: hi311x: Work around TX complete interrupt erratum (bsc#1051510)\n- can: m_can.c: fix setup of CCCR register: clear CCCR NISO bit before checking can.ctrlmode (bsc#1051510)\n- can: mpc5xxx_can: check of_iomap return before use (bsc#1051510)\n- can: peak_canfd: fix firmware: limit allocation to 32-bit DMA addr only (bsc#1051510)\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bsc#1051510)\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bsc#1051510)\n- can: xilinx_can: fix device dropping off bus on RX overrun (bsc#1051510)\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bsc#1051510)\n- can: xilinx_can: fix power management handling (bsc#1051510)\n- can: xilinx_can: fix recovery from error states not being propagated (bsc#1051510)\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bsc#1051510)\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13)\n- cdc_ncm: avoid padding beyond end of skb (networking-stable-18_06_20)\n- ceph: fix dentry leak in splice_dentry() (bsc#1098236)\n- cfg80211: initialize sinfo in cfg80211_get_station (bsc#1051510)\n- checkpatch: add 6 missing types to --list-types (bsc#1051510)\n- cifs: Check for timeout on Negotiate stage (bsc#1091171)\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171)\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097)\n- clk: Do not show the incorrect clock phase (bsc#1051510)\n- clk: Do not write error code into divider register (bsc#1051510)\n- clk: Fix __set_clk_rates error print-string (bsc#1051510)\n- clk: at91: PLL recalc_rate() now using cached MUL and DIV values (bsc#1051510)\n- clk: at91: fix clk-generated parenting (bsc#1051510)\n- clk: axi-clkgen: Correctly handle nocount bit in recalc_rate() (bsc#1051510)\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bsc#1051510)\n- clk: fix false-positive Wmaybe-uninitialized warning (bsc#1051510)\n- clk: fix mux clock documentation (bsc#1051510)\n- clk: fix set_rate_range when current rate is out of range (bsc#1051510)\n- clk: hi3660: fix incorrect uart3 clock freqency (bsc#1051510)\n- clk: hi6220: change watchdog clock source (bsc#1051510)\n- clk: hi6220: mark clock cs_atb_syspll as critical (bsc#1051510)\n- clk: hisilicon: fix potential NULL dereference in hisi_clk_alloc() (bsc#1051510)\n- clk: hisilicon: mark wdt_mux_p[] as const (bsc#1051510)\n- clk: honor CLK_MUX_ROUND_CLOSEST in generic clk mux (bsc#1051510)\n- clk: imx6: refine hdmi_isfr\u0027s parent to make HDMI work on i.MX6 SoCs w/o VPU (bsc#1051510)\n- clk: imx7d: fix mipi dphy div parent (bsc#1051510)\n- clk: mediatek: add the option for determining PLL source clock (bsc#1051510)\n- clk: mediatek: mark mtk_infrasys_init_early __init (bsc#1051510)\n- clk: meson: gxbb: fix clk_mclk_i958 divider flags (bsc#1051510)\n- clk: meson: gxbb: fix meson cts_amclk divider flags (bsc#1051510)\n- clk: meson: gxbb: fix wrong clock for SARADC/SANA (bsc#1051510)\n- clk: meson: meson8b: fix protection against undefined clks (bsc#1051510)\n- clk: meson: mpll: fix mpll0 fractional part ignored (bsc#1051510)\n- clk: meson: mpll: use 64-bit maths in params_from_rate (bsc#1051510)\n- clk: meson: remove unnecessary rounding in the pll clock (bsc#1051510)\n- clk: mvebu: use correct bit for 98DX3236 NAND (bsc#1051510)\n- clk: qcom: Base rcg parent rate off plan frequency (bsc#1051510)\n- clk: qcom: clk-smd-rpm: Fix the reported rate of branches (bsc#1051510)\n- clk: qcom: common: fix legacy board-clock registration (bsc#1051510)\n- clk: qcom: msm8916: Fix bimc gpu clock ops (bsc#1051510)\n- clk: qcom: msm8916: fix mnd_width for codec_digcodec (bsc#1051510)\n- clk: renesas: div6: Document fields used for parent selection (bsc#1051510)\n- clk: renesas: r8a7745: Remove PLL configs for MD19=0 (bsc#1051510)\n- clk: renesas: r8a7745: Remove nonexisting scu-src[0789] clocks (bsc#1051510)\n- clk: renesas: r8a7795: Correct pwm, gpio, and i2c parent clocks on ES2.0 (bsc#1051510)\n- clk: renesas: rcar-gen2: Fix PLL0 on R-Car V2H and E2 (bsc#1051510)\n- clk: rockchip: Fix wrong parent for SDMMC phase clock for rk3228 (bsc#1051510)\n- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bsc#1051510)\n- clk: samsung: Fix m2m scaler clock on Exynos542x (bsc#1051510)\n- clk: samsung: exynos3250: Fix PLL rates (bsc#1051510)\n- clk: samsung: exynos5250: Add missing clocks for FIMC LITE SYSMMU devices (bsc#1051510)\n- clk: samsung: exynos5250: Fix PLL rates (bsc#1051510)\n- clk: samsung: exynos5260: Fix PLL rates (bsc#1051510)\n- clk: samsung: exynos5433: Fix PLL rates (bsc#1051510)\n- clk: samsung: exynos7: Fix PLL rates (bsc#1051510)\n- clk: samsung: s3c2410: Fix PLL rates (bsc#1051510)\n- clk: scpi: error when clock fails to register (bsc#1051510)\n- clk: scpi: fix return type of __scpi_dvfs_round_rate (bsc#1051510)\n- clk: si5351: Rename internal plls to avoid name collisions (bsc#1051510)\n- clk: si5351: fix PLL reset (bsc#1051510)\n- clk: socfpga: Fix the smplsel on Arria10 and Stratix10 (bsc#1051510)\n- clk: sunxi-ng: Fix fractional mode for N-M clocks (bsc#1051510)\n- clk: sunxi-ng: Make fractional helper less chatty (bsc#1051510)\n- clk: sunxi-ng: Wait for lock when using fractional mode (bsc#1051510)\n- clk: sunxi-ng: a31: Fix CLK_OUT_* clock ops (bsc#1051510)\n- clk: sunxi-ng: add CLK_SET_RATE_PARENT flag to H3 GPU clock (bsc#1051510)\n- clk: sunxi-ng: add CLK_SET_RATE_UNGATE to all H3 PLLs (bsc#1051510)\n- clk: sunxi-ng: allow set parent clock (PLL_CPUX) for CPUX clock on H3 (bsc#1051510)\n- clk: sunxi-ng: h3: gate then ungate PLL CPU clk after rate change (bsc#1051510)\n- clk: sunxi-ng: multiplier: Fix fractional mode (bsc#1051510)\n- clk: sunxi-ng: nm: Check if requested rate is supported by fractional clock (bsc#1051510)\n- clk: sunxi-ng: sun5i: Fix bit offset of audio PLL post-divider (bsc#1051510)\n- clk: sunxi-ng: sun6i: Export video PLLs (bsc#1051510)\n- clk: sunxi-ng: sun6i: Rename HDMI DDC clock to avoid name collision (bsc#1051510)\n- clk: sunxi: fix build warning (bsc#1051510)\n- clk: sunxi: fix uninitialized access (bsc#1051510)\n- clk: tegra: Fix cclk_lp divisor register (bsc#1051510)\n- clk: tegra: Fix pll_u rate configuration (bsc#1051510)\n- clk: tegra: Use readl_relaxed_poll_timeout_atomic() in tegra210_clock_init() (bsc#1051510)\n- clk: ti: dra7-atl-clock: fix child-node lookups (bsc#1051510)\n- clk: uniphier: fix DAPLL2 clock rate of Pro5 (bsc#1051510)\n- clk: x86: Do not gate clocks enabled by the firmware (bsc#1051510)\n- clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bsc#1051510)\n- clocksource/drivers/stm32: Fix kernel panic with multiple timers (bsc#1051510)\n- cnic: Fix an error handling path in \u0027cnic_alloc_bnx2x_resc()\u0027 (bsc#1086324)\n- cnic: Fix an error handling path in \u0027cnic_alloc_bnx2x_resc()\u0027 (bsc#1086324)\n- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bsc#1100884)\n- cpufreq: Fix new policy initialization during limits updates via sysfs (bsc#1100884)\n- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bsc#1100884)\n- cpufreq: docs: Add missing cpuinfo_cur_freq description (bsc#1051510)\n- cpufreq: docs: Drop intel-pstate.txt from index.txt (bsc#1051510)\n- cpufreq: governors: Fix long idle detection logic in load calculation (bsc#1100884)\n- cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110)\n- cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510)\n- cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110)\n- cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110)\n- cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110)\n- cpufreq: powernv: Fix hardlockup due to synchronous smp_call in timer interrupt (bsc#1100884)\n- cpuidle: powernv: Fix promotion from snooze if next state disabled (bsc#1100884)\n- crash_dump: is_kdump_kernel can be boolean (bsc#1103230)\n- crypto: caam/qi - explicitly set dma_ops (bsc#1051510)\n- crypto: ccp - remove unused variable qim (bsc#1051510)\n- crypto: change transient busy return code to -ENOSPC (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Add authenc versions of ctr and sha (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Check error code with IS_ERR macro (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Fix IV updated in XTS operation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Fix Indentation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Fix an error code in chcr_hash_dma_map() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Fix indentation warning (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Fix iv passed in fallback path for rfc3686 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Fix src buffer dma length (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Make function aead_ccm_validate_input static (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Remove allocation of sg list to implement 2K limit of dsgl header (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Remove dst sg size zero check (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Remove unused parameter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Update IV before sending request to HW (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Use kernel round function to align lengths (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - Use x8_ble gf multiplication to calculate IV (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - check for sg null (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: chelsio - do not leak pointers to authenc keys (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bsc#1051510)\n- crypto: crypto4xx - remove bad list_del (bsc#1051510)\n- crypto: gf128mul - The x8_ble multiplication functions (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- crypto: sha512-mb - add some missing unlock on error (bsc#1051510)\n- cxgb4/cxgb4vf: Notify link changes to OS-dependent code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4/cxgb4vf: add support for ndo_set_vf_vlan (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4/cxgb4vf: check fw caps to set link mode mask (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4/cxgb4vf: link management changes for new SFP (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add FORCE_PAUSE bit to 32 bit port caps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add HMA support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add TP Congestion map entry for single-port (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add new T5 device id (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add new T6 device ids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add support for ethtool i2c dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add support to initialise/read SRQ entries (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Add support to query HW SRQ parameters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Adds CPL support for Shared Receive Queues (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Check alignment constraint for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Check for kvzalloc allocation failure (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Fix error handling path in \u0027init_one()\u0027 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Fix queue free path of ULD drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Fix {vxlan/geneve}_port initialization (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: IPv6 filter takes 2 tids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Setup FW queues before registering netdev (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Support firmware rdma write completion work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: Support firmware rdma write with immediate work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: add new T5 device id\u0027s (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: avoid schedule while atomic (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: change the port capability bits definition (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: clean up init_one (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: collect SGE PF/VF queue map (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: copy adap index to PF0-3 adapter instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: copy mbox log size to PF0-3 adap instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: copy the length of cpl_tx_pkt_core to fw_wr (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: copy vlan_id in ndo_get_vf_config (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: depend on firmware event for link status (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: do L1 config when module is inserted (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: do not display 50Gbps as unsupported speed (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: do not fail vf instatiation in slave mode (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: do not set needs_free_netdev for mgmt dev\u0027s (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: enable ZLIB_DEFLATE when building cxgb4 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: enable inner header checksum calculation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: fix the wrong conversion of Mbps to Kbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: free up resources of pf 0-3 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: increase max tx rate limit to 100 Gbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: notify fatal error to uld drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: remove dead code when allocating filter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: restructure VF mgmt code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: rework on-chip memory read (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: support new ISSI flash parts (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: update LE-TCAM collection for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: update dump collection logic to use compression (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: use CLIP with LIP6 on T6 for TCAM filters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: use zlib deflate to compress firmware dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4: zero the HMA memory (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4vf: Forcefully link up virtual interfaces (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgb4vf: display pause settings (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- cxgbit: call neigh_event_send() to update MAC address (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315)\n- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (networking-stable-18_06_08)\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28)\n- dccp: fix tasklet usage (networking-stable-18_05_15)\n- dell_rbu: make firmware payload memory uncachable (bsc#1087978)\n- device property: Allow iterating over available child fwnodes (bsc#1098633)\n- device property: Introduce fwnode_call_bool_op() for ops that return bool (bsc#1098633)\n- device property: Introduce fwnode_device_is_available() (bsc#1098633)\n- device property: Introduce fwnode_get_mac_address() (bsc#1098633)\n- device property: Introduce fwnode_get_phy_mode() (bsc#1098633)\n- device property: Introduce fwnode_irq_get() (bsc#1098633)\n- device property: Move FW type specific functionality to FW specific files (bsc#1098633)\n- device property: Move fwnode graph ops to firmware specific locations (bsc#1098633)\n- device property: preserve usecount for node passed to of_fwnode_graph_get_port_parent() (bsc#1098633)\n- device: Fix kABI breakage for of/device change (bsc#1051510)\n- devlink: Remove redundant free on error path (networking-stable-18_03_28)\n- dm integrity: use kvfree for kvmalloc\u0027d memory (bsc#1099918)\n- dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918)\n- dm raid: do not use \u0027const\u0027 in function return (bsc#1099918)\n- dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918)\n- dm: convert DM printk macros (bsc#1099918)\n- dm: fix printk() rate limiting code (bsc#1099918)\n- dm: use bio_split() when splitting out the already processed bio (bsc#1099918)\n- dmaengine: fsl-edma: disable clks on all error paths (bsc#1051510)\n- dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bsc#1051510)\n- dmaengine: mv_xor_v2: Fix clock resource by adding a register clock (bsc#1051510)\n- dmaengine: omap-dma: port_window support correction for both direction (bsc#1051510)\n- dmaengine: pl330: fix a race condition in case of threaded irqs (bsc#1051510)\n- dmaengine: pl330: report BURST residue granularity (bsc#1051510)\n- dmaengine: qcom: bam_dma: get num-channels and num-ees from dt (bsc#1051510)\n- dmaengine: qcom_hidma: check pending interrupts (bsc#1051510)\n- dmaengine: rcar-dmac: Check the done lists in rcar_dmac_chan_get_residue() (bsc#1051510)\n- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bsc#1051510)\n- dmaengine: tegra-apb: Really fix runtime-pm usage (bsc#1051510)\n- dmaengine: tegra210-adma: fix of_irq_get() error check (bsc#1051510)\n- dmaengine: xilinx_dma: Fix error code format specifier (bsc#1051510)\n- dmaengine: zynqmp_dma: Fix race condition in the probe (bsc#1051510)\n- doc: Rename .system_keyring to .builtin_trusted_keys (bsc#1051510)\n- doc: SKB_GSO_[IPIP|SIT] have been replaced (bsc#1051510)\n- docs-rst: fix broken links to dynamic-debug-howto in kernel-parameters (bsc#1051510)\n- docs: segmentation-offloads.txt: Fix ref to SKB_GSO_TUNNEL_REMCSUM (bsc#1051510)\n- documentation: admin-guide: intel_pstate: Fix sysfs path (bsc#1051510)\n- dp83640: Ensure against premature access to PHY registers after reset (bsc#1051510)\n- dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28)\n- dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28)\n- dpaa_eth: remove duplicate initialization (networking-stable-18_03_28)\n- drbd: Fix drbd_request_prepare() discard handling (bsc#1099918)\n- drbd: fix access after free (bsc#1051510)\n- driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510)\n- driver core: Fix link to device power management documentation (bsc#1051510)\n- driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918)\n- driver core: Partially revert \u0027driver core: correct device\u0027s shutdown order\u0027 (bsc#1051510)\n- drivers/firmware: psci_checker: Add missing destroy_timer_on_stack() (bsc#1051510)\n- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301)\n- drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301)\n- drivers: Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035)\n- drivers: net: bnx2x: use setup_timer() helper (bsc#1086323)\n- drivers: net: i40evf: use setup_timer() helper (bsc#1101816)\n- drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510)\n- drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510)\n- drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510)\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510)\n- drm/bridge/sii8620: fix potential buffer overflow (bsc#1051510)\n- drm/exynos: Fix dma-buf import (bsc#1051510)\n- drm/i915/dp: Send DPCD ON for MST before phy_up (bsc#1051510)\n- drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510)\n- drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510)\n- drm/i915: Apply batch location restrictions before pinning (bsc#1051510)\n- drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510)\n- drm/i915: Fix context ban and hang accounting for client (bsc#1051510)\n- drm/i915: Fix hotplug irq ack on i965/g4x (bsc#1051510)\n- drm/i915: Only call tasklet_kill() on the first prepare_reset (bsc#1051510)\n- drm/i915: Remove unbannable context spam from reset (bsc#1051510)\n- drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510)\n- drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209)\n- drm/nouveau/drm/nouveau: Fix runtime PM leak in nv50_disp_atomic_commit() (bsc#1090888)\n- drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1051510)\n- drm/nouveau: Avoid looping through fake MST connectors (bsc#1051510)\n- drm/nouveau: Use drm_connector_list_iter_* for iterating connectors (bsc#1051510)\n- drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510)\n- drm/rockchip: Fix build warning in analogix_dp-rockchip.c (bsc#1085536)\n- drm/rockchip: analogix_dp: Remove unnecessary init code (bsc#1085536)\n- drm/rockchip: dw_hdmi: Move HDMI vpll clock enable to bind() (bsc#1087092)\n- drm/rockchip: inno_hdmi: Fix error handling path (bsc#1087092)\n- drm/rockchip: inno_hdmi: reorder clk_disable_unprepare call in unbind (bsc#1087092)\n- drm/tegra: Acquire a reference to the IOVA cache (bsc#1090888)\n- drm/udl: fix display corruption of the last line (bsc#1101337)\n- drm: Use kvzalloc for allocating blob property memory (bsc#1101352)\n- drm: mali-dp: Uninitialized variable in malidp_se_check_scaling() (bsc#1087092)\n- drm: rcar-du: Remove zpos field from rcar_du_vsp_plane_state structure (bsc#1085539)\n- drm: rcar-du: lvds: Fix LVDCR1 for R-Car gen3 (bsc#1085539)\n- dvb_frontend: do not use-after-free the frontend struct (bsc#1051510)\n- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876)\n- earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918)\n- efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps() (bsc#1051510)\n- enic: do not overwrite error code (bsc#1037697)\n- enic: enable rq before updating rq descriptors (bsc#1037697)\n- enic: set DMA mask to 47 bit (networking-stable-18_06_08)\n- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282)\n- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282)\n- ethtool: add ethtool_intersect_link_masks (bsc#1101816)\n- f2fs: fix to wake up all sleeping flusher (bsc#1099918)\n- fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07)\n- firewire: net: max MTU off by one (bsc#1051510)\n- firmware: arm_scpi: fix endianness of dev_id in struct dev_pstate_set (bsc#1051510)\n- firmware: dmi: Optimize dmi_matches (bsc#1051510)\n- firmware: tegra: Fix locking bugs in BPMP (bsc#1051510)\n- fix Patch-mainline header\n- fix kabi due to perf_event.h uapi field change\n- flow_dissector: properly cap thoff field (networking-stable-18_01_28)\n- fm10k: Fix configuration for macvlan offload (bsc#1101813)\n- fm10k: Fix misuse of net_ratelimit() (bsc#1101813)\n- fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813)\n- fm10k: add missing fall through comment (bsc#1101813)\n- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813)\n- fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813)\n- fm10k: avoid needless delay when loading driver (bsc#1101813)\n- fm10k: avoid possible truncation of q_vector-\u003ename (bsc#1101813)\n- fm10k: bump version number (bsc#1101813)\n- fm10k: clarify action when updating the VLAN table (bsc#1101813)\n- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813)\n- fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813)\n- fm10k: correct typo in fm10k_pf.c (bsc#1101813)\n- fm10k: do not assume VLAN 1 is enabled (bsc#1101813)\n- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813)\n- fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813)\n- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813)\n- fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813)\n- fm10k: fix \u0027failed to kill vid\u0027 message for VF (bsc#1101813)\n- fm10k: fix function doxygen comments (bsc#1101813)\n- fm10k: fix incorrect warning for function prototype (bsc#1101813)\n- fm10k: fix typos on fall through comments (bsc#1101813)\n- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813)\n- fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813)\n- fm10k: mark PM functions as __maybe_unused (bsc#1101813)\n- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813)\n- fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813)\n- fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813)\n- fm10k: prepare_for_reset() when we lose pcie Link (bsc#1101813)\n- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813)\n- fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813)\n- fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813)\n- fm10k: reschedule service event if we stall the PF-SM mailbox (bsc#1101813)\n- fm10k: reschedule service event if we stall the PF-SM mailbox (bsc#1101813)\n- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813)\n- fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813)\n- fm10k: simplify reading PFVFLRE register (bsc#1101813)\n- fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813)\n- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813)\n- fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813)\n- fm10k: use generic PM hooks instead of legacy pcie power hooks (bsc#1101813)\n- fm10k: use generic PM hooks instead of legacy pcie power hooks (bsc#1101813)\n- fm10k: use macro to avoid passing the array and size separately (bsc#1101813)\n- fm10k: use macro to avoid passing the array and size separately (bsc#1101813)\n- fm10k: use spinlock to implement mailbox lock (bsc#1101813)\n- fm10k: use the MAC/VLAN queue for VF-PF MAC/VLAN requests (bsc#1101813)\n- fm10k: use the MAC/VLAN queue for VF-PF MAC/VLAN requests (bsc#1101813)\n- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813)\n- fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813)\n- fm10k: warn if the stat size is unknown (bsc#1101813)\n- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142)\n- fsi: core: register with postcore_initcall (bsc#1051510)\n- ftrace: Fix selftest goto location on error (bsc#1099918)\n- fuse: Remove the buggy retranslation of pids in fuse_dev_do_read (bsc#1051510)\n- fuse: atomic_o_trunc should truncate pagecache (bsc#1051510)\n- fuse: do not keep dead fuse_conn at fuse_fill_super() (bsc#1051510)\n- fuse: fix congested state leak on aborted connections (bsc#1051510)\n- fuse: fix control dir setup and teardown (bsc#1051510)\n- gpio: acpi: work around false-positive -Wstring-overflow warning (bsc#1051510)\n- gpio: brcmstb: allow all instances to be wakeup sources (bsc#1051510)\n- gpio: brcmstb: check return value of gpiochip_irqchip_add() (bsc#1051510)\n- gpio: brcmstb: correct the configuration of level interrupts (bsc#1051510)\n- gpio: brcmstb: release the bgpio lock during irq handlers (bsc#1051510)\n- gpio: brcmstb: switch to handle_level_irq flow (bsc#1051510)\n- gpio: pca953x: fix vendor prefix for PCA9654 (bsc#1051510)\n- gpio: reject invalid gpio before getting gpio_desc (bsc#1051510)\n- gpio: tegra: fix unbalanced chained_irq_enter/exit (bsc#1051510)\n- gpu: host1x: Acquire a reference to the IOVA cache (bsc#1090888)\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07)\n- hid: add backlight level quirk for Asus ROG laptops (bsc#1101324)\n- hid: debug: check length before copy_to_user() (bsc#1051510)\n- hid: hiddev: fix potential Spectre v1 (bsc#1051510)\n- hid: i2c-hid: Fix \u0027incomplete report\u0027 noise (bsc#1051510)\n- hid: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510)\n- hid: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510)\n- hid: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510)\n- hid: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633)\n- hid: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510)\n- hid: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510)\n- hid: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510)\n- hwmon: (aspeed-pwm) add THERMAL dependency (bsc#1051510)\n- hwmon: (ftsteutates) Fix clearing alarm sysfs entries (bsc#1051510)\n- hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510)\n- hwmon: (ltc2990) Fix incorrect conversion of negative temperatures (bsc#1051510)\n- hwmon: (nct6683) Enable EC access if disabled at boot (bsc#1051510)\n- hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510)\n- hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510)\n- hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510)\n- hwmon: (stts751) buffer overrun on wrong chip configuration (bsc#1051510)\n- hwmon: (tmp102) Fix first temperature reading (bsc#1051510)\n- hwmon: Deal with errors from the thermal subsystem (bsc#1051510)\n- hwrng: stm32 - add reset during probe (bsc#1051510)\n- hwtracing: stm: fix build error on some arches (bsc#1051510)\n- i2c: axxia: enable clock before calling clk_get_rate() (bsc#1051510)\n- i2c: designware: Round down acpi provided clk to nearest supported clk (bsc#1051510)\n- i2c: mux: pinctrl: mention correct module name in Kconfig help text (bsc#1051510)\n- i2c: pmcmsp: fix error return from master_xfer (bsc#1051510)\n- i2c: pmcmsp: return message count on master_xfer success (bsc#1051510)\n- i2c: tegra: Fix NACK error handling (bsc#1051510)\n- i2c: viperboard: return message count on master_xfer success (bsc#1051510)\n- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816)\n- i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816)\n- i40e/i40evf: Bump driver versions (bsc#1101816)\n- i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816)\n- i40e/i40evf: Clean-up of bits related to using q_vector-\u003ereg_idx (bsc#1101816)\n- i40e/i40evf: Clean-up of bits related to using q_vector-\u003ereg_idx (bsc#1101816)\n- i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816)\n- i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816)\n- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816)\n- i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816)\n- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816)\n- i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816)\n- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816)\n- i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816)\n- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816)\n- i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816)\n- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816)\n- i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816)\n- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816)\n- i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816)\n- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816)\n- i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816)\n- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816)\n- i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816)\n- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816)\n- i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816)\n- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816)\n- i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816)\n- i40e/i40evf: do not trust VF to reset itself (bsc#1101816)\n- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816)\n- i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816)\n- i40e/i40evf: organize and re-number feature flags (bsc#1101816)\n- i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816)\n- i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816)\n- i40e/i40evf: use SW variables for hang detection (bsc#1101816)\n- i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816)\n- i40e: Add advertising 10G LR mode (bsc#1101816)\n- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816)\n- i40e: Add delay after EMP reset for firmware to recover (bsc#1101816)\n- i40e: Add infrastructure for queue channel support (bsc#1101816)\n- i40e: Add macro for PF reset bit (bsc#1101816)\n- i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816)\n- i40e: Add returning AQ critical error to SW (bsc#1101816)\n- i40e: Add support for \u0027ethtool -m\u0027 (bsc#1101816)\n- i40e: Cleanup i40e_vlan_rx_register (bsc#1101816)\n- i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821)\n- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816)\n- i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816)\n- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816)\n- i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816)\n- i40e: Display error message if module does not meet thermal requirements (bsc#1101816)\n- i40e: Display error message if module does not meet thermal requirements (bsc#1101816)\n- i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978)\n- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816)\n- i40e: Enable VF to negotiate number of allocated queues (bsc#1101816)\n- i40e: Fix FLR reset timeout issue (bsc#1101816)\n- i40e: Fix a potential NULL pointer dereference (bsc#1101816)\n- i40e: Fix for NUP NVM image downgrade failure (bsc#1101816)\n- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816)\n- i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816)\n- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816)\n- i40e: Fix for blinking activity instead of link LEDs (bsc#1101816)\n- i40e: Fix kdump failure (bsc#1101816)\n- i40e: Fix link down message when interface is brought up (bsc#1101816)\n- i40e: Fix link down message when interface is brought up (bsc#1101816)\n- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816)\n- i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816)\n- i40e: Fix permission check for VF MAC filters (bsc#1101816)\n- i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816)\n- i40e: Fix reporting of supported link modes (bsc#1101816)\n- i40e: Fix the number of queues available to be mapped for use (bsc#1094978)\n- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816)\n- i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816)\n- i40e: Fix unqualified module message while bringing link up (bsc#1101816)\n- i40e: Fix unqualified module message while bringing link up (bsc#1101816)\n- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816)\n- i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816)\n- i40e: Prevent setting link speed on KX_X722 (bsc#1101816)\n- i40e: Properly maintain flow director filters list (bsc#1101816)\n- i40e: Remove limit of 64 max queues per channel (bsc#1101816)\n- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816)\n- i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816)\n- i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816)\n- i40e: add check for return from find_first_bit call (bsc#1101816)\n- i40e: add doxygen comment for new mode parameter (bsc#1101816)\n- i40e: add function doc headers for ethtool stats functions (bsc#1101816)\n- i40e: add function doc headers for ethtool stats functions (bsc#1101816)\n- i40e: add function header for i40e_get_rxfh (bsc#1101816)\n- i40e: add helper conversion function for link_speed (bsc#1101816)\n- i40e: add tx_busy to ethtool stats (bsc#1101816)\n- i40e: allow XPS with QoS enabled (bsc#1101816)\n- i40e: always return VEB stat strings (bsc#1101816)\n- i40e: always return all queue stat strings (bsc#1101816)\n- i40e: avoid divide by zero (bsc#1101816)\n- i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816)\n- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816)\n- i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816)\n- i40e: calculate ethtool stats size in a separate function (bsc#1101816)\n- i40e: calculate ethtool stats size in a separate function (bsc#1101816)\n- i40e: change flags to use 64 bits (bsc#1101816)\n- i40e: change ppp name to ddp (bsc#1101816)\n- i40e: check for invalid DCB config (bsc#1101816)\n- i40e: cleanup unnecessary parens (bsc#1101816)\n- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816)\n- i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816)\n- i40e: cleanup wording in a header comment (bsc#1101816)\n- i40e: convert i40e_get_settings_link_up to new API (bsc#1101816)\n- i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816)\n- i40e: convert i40e_set_link_ksettings to new API (bsc#1101816)\n- i40e: disallow programming multiple filters with same criteria (bsc#1101816)\n- i40e: disallow programming multiple filters with same criteria (bsc#1101816)\n- i40e: display priority_xon and priority_xoff stats (bsc#1101816)\n- i40e: do not clear suspended state until we finish resuming (bsc#1101816)\n- i40e: do not clear suspended state until we finish resuming (bsc#1101816)\n- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816)\n- i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816)\n- i40e: do not force filter failure in overflow promiscuous (bsc#1101816)\n- i40e: do not force filter failure in overflow promiscuous (bsc#1101816)\n- i40e: do not hold spinlock while resetting VF (bsc#1101816)\n- i40e: do not leak memory addresses (bsc#1101816)\n- i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816)\n- i40e: ensure reset occurs when disabling VF (bsc#1101816)\n- i40e: factor out re-enable functions for ATR and SB (bsc#1101816)\n- i40e: fix a typo (bsc#1101816)\n- i40e: fix a typo in i40e_pf documentation (bsc#1101816)\n- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816)\n- i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816)\n- i40e: fix comment typo (bsc#1101816)\n- i40e: fix flags declaration (bsc#1101816)\n- i40e: fix for flow director counters not wrapping as expected (bsc#1101816)\n- i40e: fix for flow director counters not wrapping as expected (bsc#1101816)\n- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816)\n- i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816)\n- i40e: fix handling of vf_states variable (bsc#1101816)\n- i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816)\n- i40e: fix incorrect register definition (bsc#1101816)\n- i40e: fix link reporting (bsc#1101816)\n- i40e: fix merge error (bsc#1101816)\n- i40e: fix reading LLDP configuration (bsc#1101816)\n- i40e: fix typo in function description (bsc#1101816)\n- i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816)\n- i40e: fold prefix strings directly into stat names (bsc#1101816)\n- i40e: free skb after clearing lock in ptp_stop (bsc#1101816)\n- i40e: free the skb after clearing the bitlock (bsc#1101816)\n- i40e: group autoneg PHY types together (bsc#1101816)\n- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816)\n- i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816)\n- i40e: ignore skb-\u003exmit_more when deciding to set RS bit (bsc#1101816)\n- i40e: ignore skb-\u003exmit_more when deciding to set RS bit (bsc#1101816)\n- i40e: implement split pci error reset handler (bsc#1101816)\n- i40e: limit lan queue count in large CPU count machine (bsc#1101816)\n- i40e: limit lan queue count in large CPU count machine (bsc#1101816)\n- i40e: make const array patterns static, reduces object code size (bsc#1101816)\n- i40e: make const array patterns static, reduces object code size (bsc#1101816)\n- i40e: make i40evf_map_rings_to_vectors void (bsc#1101816)\n- i40e: make use of i40e_vc_disable_vf (bsc#1101816)\n- i40e: mark PM functions as __maybe_unused (bsc#1101816)\n- i40e: move AUTO_DISABLED flags into the state field (bsc#1101816)\n- i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816)\n- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816)\n- i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816)\n- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816)\n- i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816)\n- i40e: move client flags into state bits (bsc#1101816)\n- i40e: prevent service task from running while we\u0027re suspended (bsc#1101816)\n- i40e: prevent service task from running while we\u0027re suspended (bsc#1101816)\n- i40e: re-enable PTP L4 capabilities for XL710 if FW \u003e6.0 (bsc#1101816)\n- i40e: re-enable PTP L4 capabilities for XL710 if FW \u003e6.0 (bsc#1101816)\n- i40e: re-number feature flags to remove gaps (bsc#1101816)\n- i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816)\n- i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816)\n- i40e: refactor FW version checking (bsc#1101816)\n- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816)\n- i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816)\n- i40e: relax warning message in case of version mismatch (bsc#1101816)\n- i40e: relax warning message in case of version mismatch (bsc#1101816)\n- i40e: remove duplicate pfc stats (bsc#1101816)\n- i40e: remove i40e_fcoe files (bsc#1101816)\n- i40e: remove ifdef SPEED_25000 (bsc#1101816)\n- i40e: remove logically dead code (bsc#1101816)\n- i40e: remove redundant initialization of read_size (bsc#1101816)\n- i40e: rename \u0027change\u0027 variable to \u0027autoneg_changed\u0027 (bsc#1101816)\n- i40e: rename \u0027cmd\u0027 variables in ethtool interface (bsc#1101816)\n- i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816)\n- i40e: restore promiscuous after reset (bsc#1101816)\n- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816)\n- i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816)\n- i40e: simplify member variable accesses (bsc#1101816)\n- i40e: split i40e_get_strings() into smaller functions (bsc#1101816)\n- i40e: split i40e_get_strings() into smaller functions (bsc#1101816)\n- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816)\n- i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816)\n- i40e: track filter type statistics when deleting invalid filters (bsc#1101816)\n- i40e: track filter type statistics when deleting invalid filters (bsc#1101816)\n- i40e: track id can be 0 (bsc#1101816)\n- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816)\n- i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816)\n- i40e: update data pointer directly when copying to the buffer (bsc#1101816)\n- i40e: update data pointer directly when copying to the buffer (bsc#1101816)\n- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816)\n- i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816)\n- i40e: use a local variable instead of calculating multiple times (bsc#1101816)\n- i40e: use a local variable instead of calculating multiple times (bsc#1101816)\n- i40e: use admin queue for setting LEDs behavior (bsc#1101816)\n- i40e: use newer generic PM support instead of legacy PM callbacks (bsc#1101816)\n- i40e: use newer generic PM support instead of legacy PM callbacks (bsc#1101816)\n- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816)\n- i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816)\n- i40e: use the more traditional \u0027i\u0027 loop variable (bsc#1101816)\n- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816)\n- i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816)\n- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816)\n- i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816)\n- i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816)\n- i40evf: Do not clear MSI-X PBA manually (bsc#1101816)\n- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816)\n- i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816)\n- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816)\n- i40evf: Enable VF to request an alternate queue allocation (bsc#1101816)\n- i40evf: Fix a hardware reset support in VF driver (bsc#1101816)\n- i40evf: Fix double locking the same resource (bsc#1101816)\n- i40evf: Fix link up issue when queues are disabled (bsc#1101816)\n- i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816)\n- i40evf: Make VF reset warning message more clear (bsc#1101816)\n- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816)\n- i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816)\n- i40evf: Use an iterator of the same type as the list (bsc#1101816)\n- i40evf: Use an iterator of the same type as the list (bsc#1101816)\n- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816)\n- i40evf: enable support for VF VLAN tag stripping control (bsc#1101816)\n- i40evf: fix client notify of l2 params (bsc#1101816)\n- i40evf: fix ring to vector mapping (bsc#1101816)\n- i40evf: hold the critical task bit lock while opening (bsc#1101816)\n- i40evf: hold the critical task bit lock while opening (bsc#1101816)\n- i40evf: lower message level (bsc#1101816)\n- i40evf: release bit locks in reverse order (bsc#1101816)\n- i40evf: remove flags that are never used (bsc#1101816)\n- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816)\n- i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816)\n- i40evf: use GFP_ATOMIC under spin lock (bsc#1101816)\n- i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816)\n- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816)\n- i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816)\n- i40iw: Fix memory leak in error path of create QP (bsc#1058659)\n- i40iw: Refactor of driver generated AEs (bsc#1058659)\n- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659)\n- i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659)\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659)\n- i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659)\n- ib/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793)\n- ib/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793)\n- ib/core: Fix error code for invalid GID entry (bsc#1046306)\n- ib/core: Honor port_num while resolving GID for IB link layer (bsc#1046306)\n- ib/core: Honor port_num while resolving GID for IB link layer (bsc#1046306)\n- ib/core: Make ib_mad_client_id atomic (bsc#1046306)\n- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306)\n- ib/core: Make testing MR flags for writability a static inline function (bsc#1046306)\n- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306)\n- ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306)\n- ib/hfi1 Use correct type for num_user_context (bsc#1096793)\n- ib/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793)\n- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463)\n- ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463)\n- ib/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793)\n- ib/hfi1: Complete check for locally terminated smp (bsc#1096793)\n- ib/hfi1: Compute BTH only for rdma_WRITE_LAST/SEND_LAST packet (bsc#1096793)\n- ib/hfi1: Compute BTH only for rdma_WRITE_LAST/SEND_LAST packet (bsc#1096793)\n- ib/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793)\n- ib/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793)\n- ib/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793)\n- ib/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793)\n- ib/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793)\n- ib/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793)\n- ib/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793)\n- ib/hfi1: Do not override given pcie_pset value (bsc#1096793)\n- ib/hfi1: Ensure VL index is within bounds (bsc#1096793)\n- ib/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793)\n- ib/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793)\n- ib/hfi1: Fix fault injection init/exit issues (bsc#1060463)\n- ib/hfi1: Fix for early release of sdma context (bsc#1096793)\n- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463)\n- ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463)\n- ib/hfi1: Fix loss of BECN with AHG (bsc#1096793)\n- ib/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793)\n- ib/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793)\n- ib/hfi1: Fix serdes loopback set-up (bsc#1096793)\n- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463)\n- ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463)\n- ib/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793)\n- ib/hfi1: Inline common calculation (bsc#1096793)\n- ib/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793)\n- ib/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793)\n- ib/hfi1: Look up ibport using a pointer in receive path (bsc#1096793)\n- ib/hfi1: Look up ibport using a pointer in receive path (bsc#1096793)\n- ib/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793)\n- ib/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793)\n- ib/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793)\n- ib/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793)\n- ib/hfi1: Prevent LNI hang when LCB can\u0027t obtain lanes (bsc#1096793)\n- ib/hfi1: Prevent LNI hang when LCB can\u0027t obtain lanes (bsc#1096793)\n- ib/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793)\n- ib/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793)\n- ib/hfi1: Race condition between user notification and driver state (bsc#1096793)\n- ib/hfi1: Race condition between user notification and driver state (bsc#1096793)\n- ib/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793)\n- ib/hfi1: Refactor get_base_info (bsc#1096793)\n- ib/hfi1: Refactor get_ctxt_info (bsc#1096793)\n- ib/hfi1: Refactor get_user() IOCTLs (bsc#1096793)\n- ib/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793)\n- ib/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793)\n- ib/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793)\n- ib/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793)\n- ib/hfi1: Reorder incorrect send context disable (bsc#1096793)\n- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463)\n- ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463)\n- ib/hfi1: Return correct value for device state (bsc#1096793)\n- ib/hfi1: Send \u0027reboot\u0027 as planned down remote reason (bsc#1096793)\n- ib/hfi1: Send \u0027reboot\u0027 as planned down remote reason (bsc#1096793)\n- ib/hfi1: Set port number for errorinfo MAD response (bsc#1096793)\n- ib/hfi1: Show fault stats in both TX and RX directions (bsc#1096793)\n- ib/hfi1: Show fault stats in both TX and RX directions (bsc#1096793)\n- ib/hfi1: Update HFI to use the latest pci API (bsc#1096793)\n- ib/hfi1: Use after free race condition in send context error path (bsc#1096793)\n- ib/hfi1: Use after free race condition in send context error path (bsc#1096793)\n- ib/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793)\n- ib/ipoib: Change number of TX wqe to 64 (bsc#1096793)\n- ib/ipoib: Fix for notify send CQ failure messages (bsc#1096793)\n- ib/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793)\n- ib/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793)\n- ib/ipoib: Use NAPI in UD/TX flows (bsc#1096793)\n- ib/iser: Do not reduce max_sectors (bsc#1046306)\n- ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306)\n- ib/isert: fix T10-pi check mask setting (bsc#1046306)\n- ib/mlx4: Fix an error handling path in \u0027mlx4_ib_rereg_user_mr()\u0027 (bsc#1046302)\n- ib/mlx4: Fix an error handling path in \u0027mlx4_ib_rereg_user_mr()\u0027 (bsc#1046302)\n- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302)\n- ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302)\n- ib/mlx5: Fetch soft WQE\u0027s on fatal error state (bsc#1046305)\n- ib/mlx5: Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046305)\n- ib/mlx5: Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046305)\n- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301)\n- ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301)\n- ib/rdmavt: Add trace for RNRNAK timer (bsc#1096793)\n- ib/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793)\n- ib/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793)\n- ib/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793)\n- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306)\n- ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306)\n- ib/rxe: add RXE_START_MASK for rxe_opcode IB_OPCODE_RC_SEND_ONLY_INV (bsc#1046306)\n- ib/rxe: add RXE_START_MASK for rxe_opcode IB_OPCODE_RC_SEND_ONLY_INV (bsc#1046306)\n- ib/rxe: avoid double kfree_skb (bsc#1046306)\n- ib/umem: Use the correct mm during ib_umem_release (bsc#1046306)\n- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306)\n- ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306)\n- ib/{hfi1, qib}: Add handling of kernel restart (bsc#1096793)\n- ib/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793)\n- ib/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793)\n- ib/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793)\n- ib/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793)\n- ibmvnic: Fix error recovery on login failure (bsc#1101789)\n- ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918)\n- ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918)\n- ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918)\n- idr: fix invalid ptr dereference on item delete (bsc#1051510)\n- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28)\n- igb: Fix not adding filter elements to the list (bsc#1056651)\n- igb: Fix queue selection on MAC filters on i210 (bsc#1056651)\n- iio: BME280: Updates to Humidity readings need ctrl_reg write! (bsc#1051510)\n- iio: accel: st_accel: fix data-ready line configuration (bsc#1051510)\n- iio: accel: st_accel_i2c: fix i2c_device_id table (bsc#1051510)\n- iio: accel: st_accel_spi: fix spi_device_id table (bsc#1051510)\n- iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510)\n- iio: adc: sun4i-gpadc-iio: fix unbalanced irq enable/disable (bsc#1051510)\n- iio: adc: twl4030: Return an error if we can not enable the vusb3v1 regulator in \u0027twl4030_madc_probe()\u0027 (bsc#1051510)\n- iio: buffer: fix the function signature to match implementation (bsc#1051510)\n- iio: gyro: st_gyro: fix L3GD20H support (bsc#1051510)\n- iio: humidity: hts221: remove warnings in hts221_parse_{temp,rh}_caldata() (bsc#1051510)\n- iio: imu: inv_mpu6050: test whoami first and against all known values (bsc#1051510)\n- iio: magnetometer: st_magn: fix drdy line configuration for LIS3MDL (bsc#1051510)\n- iio: magnetometer: st_magn_core: enable multiread by default for LIS3MDL (bsc#1051510)\n- iio: magnetometer: st_magn_spi: fix spi_device_id table (bsc#1051510)\n- iio: pressure: bmp280: fix relative humidity unit (bsc#1051510)\n- iio: pressure: st_pressure: fix drdy configuration for LPS22HB and LPS25H (bsc#1051510)\n- iio: pressure: zpa2326: Remove always-true check which confuses gcc (bsc#1051510)\n- iio: pressure: zpa2326: report interrupted case as failure (bsc#1051510)\n- iio: trigger: stm32-timer: fix quadrature mode get routine (bsc#1051510)\n- iio: trigger: stm32-timer: fix write_raw return value (bsc#1051510)\n- iio: tsl2583: correct values in integration_time_available (bsc#1051510)\n- iio:buffer: make length types match kfifo types (bsc#1051510)\n- iio:kfifo_buf: check for uint overflow (bsc#1051510)\n- infiniband: fix a possible use-after-free bug (bsc#1046306)\n- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) acpi ID (bsc#1051510)\n- input: elan_i2c_smbus - fix more potential stack buffer overflows (bsc#1051510)\n- input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510)\n- input: elantech - fix V4 report decoding for module with middle key (bsc#1051510)\n- input: xpad - fix GPD Win 2 controller name (bsc#1051510)\n- iommu/vt-d: Clear Page Request Overflow fault bit\n- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034)\n- ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10)\n- ip6_gre: init dev-\u003emtu and dev-\u003ehard_header_len correctly (networking-stable-18_01_28)\n- ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10)\n- ip6_tunnel: remove magic mtu value 0xFFF8 (networking-stable-18_06_08)\n- ip6mr: fix stale iterator (networking-stable-18_02_06)\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes)\n- ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10)\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1102512)\n- ipmr: properly check rhltable_init() return value (networking-stable-18_06_08)\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28)\n- ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15)\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15)\n- ipv4: remove warning in ip_recv_error (networking-stable-18_06_08)\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07)\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26)\n- ipv6: allow PMTU exceptions to local routes (networking-stable-18_06_20)\n- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28)\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28)\n- ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28)\n- ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10)\n- ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes)\n- ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28)\n- ipv6: sr: fix memory OOB access in seg6_do_srh_encap/inline (networking-stable-18_06_08)\n- ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28)\n- ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10)\n- ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10)\n- irqchip/gic-v3-its: Ensure nr_ites \u003e= nr_lpis (bsc#1098401)\n- iw_cxgb4: Add ib_device-\u003eget_netdev support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543)\n- iw_cxgb4: initialize ib_mr fields for user mrs (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- iwlwifi: fw: harden page loading code (bsc#1051510)\n- iwlwifi: pcie: compare with number of IRQs requested for, not number of CPUs (bsc#1051510)\n- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674)\n- ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674)\n- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674)\n- ixgbe/ixgbevf: Free IRQ when pci error recovery removes the device (bsc#1101674)\n- ixgbe: Add receive length error counter (bsc#1101674)\n- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674)\n- ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674)\n- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674)\n- ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674)\n- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674)\n- ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674)\n- ixgbe: Clear SWFW_SYNC register during init (bsc#1101674)\n- ixgbe: Default to 1 pool always being allocated (bsc#1101674)\n- ixgbe: Do not assume dev-\u003enum_tc is equal to hardware TC config (bsc#1101674)\n- ixgbe: Do not assume dev-\u003enum_tc is equal to hardware TC config (bsc#1101674)\n- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674)\n- ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674)\n- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674)\n- ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674)\n- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674)\n- ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674)\n- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674)\n- ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674)\n- ixgbe: Fix handling of macvlan Tx offload (bsc#1101674)\n- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674)\n- ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674)\n- ixgbe: Fix kernel-doc format warnings (bsc#1101674)\n- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674)\n- ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674)\n- ixgbe: Fix logical operators typo (bsc#1101674)\n- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674)\n- ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674)\n- ixgbe: Perform reinit any time number of VFs change (bsc#1101674)\n- ixgbe: Remove an obsolete comment about ITR (bsc#1101674)\n- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674)\n- ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674)\n- ixgbe: Update adaptive ITR algorithm (bsc#1101674)\n- ixgbe: Use ring values to test for Tx pending (bsc#1101674)\n- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674)\n- ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674)\n- ixgbe: add error checks when initializing the PHY (bsc#1101674)\n- ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674)\n- ixgbe: add support for reporting 5G link speed (bsc#1101674)\n- ixgbe: advertise highest capable link speed (bsc#1101674)\n- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674)\n- ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674)\n- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674)\n- ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674)\n- ixgbe: enable multicast on shutdown for WOL (bsc#1101674)\n- ixgbe: extend firmware version support (bsc#1101674)\n- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674)\n- ixgbe: fix crash when injecting AER after failed reset (bsc#1101674)\n- ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674)\n- ixgbe: fix possible race in reset subtask (bsc#1101674)\n- ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674)\n- ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674)\n- ixgbe: force VF to grab new MAC on driver reload (bsc#1101674)\n- ixgbe: introduce a helper to simplify code (bsc#1101674)\n- ixgbe: remove redundant initialization of \u0027pool\u0027 (bsc#1101674)\n- ixgbe: remove unused enum latency_range (bsc#1101674)\n- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674)\n- ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674)\n- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674)\n- ixgbe: return error on unsupported SFP module when resetting (bsc#1101674)\n- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674)\n- ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674)\n- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674)\n- ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674)\n- ixgbevf: Fix kernel-doc format warnings (bsc#1101674)\n- ixgbevf: add build_skb support (bsc#1101674)\n- ixgbevf: add counters for Rx page allocations (bsc#1101674)\n- ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674)\n- ixgbevf: add function for checking if we can reuse page (bsc#1101674)\n- ixgbevf: add function for checking if we can reuse page (bsc#1101674)\n- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674)\n- ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674)\n- ixgbevf: add support for padding packet (bsc#1101674)\n- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674)\n- ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674)\n- ixgbevf: allocate the rings as part of q_vector (bsc#1101674)\n- ixgbevf: break out Rx buffer page management (bsc#1101674)\n- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674)\n- ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674)\n- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674)\n- ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674)\n- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674)\n- ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674)\n- ixgbevf: fix ixgbevf_xmit_frame()\u0027s return type (bsc#1101674)\n- ixgbevf: fix possible race in the reset subtask (bsc#1101674)\n- ixgbevf: fix unused variable warning (bsc#1101674)\n- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674)\n- ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674)\n- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674)\n- ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674)\n- ixgbevf: only DMA sync frame length (bsc#1101674)\n- ixgbevf: remove redundant initialization of variable \u0027dma\u0027 (bsc#1101674)\n- ixgbevf: remove redundant initialization of variable \u0027dma\u0027 (bsc#1101674)\n- ixgbevf: remove redundant setting of xcast_mode (bsc#1101674)\n- ixgbevf: setup queue counts (bsc#1101674)\n- ixgbevf: update code to better handle incrementing page count (bsc#1101674)\n- ixgbevf: update code to better handle incrementing page count (bsc#1101674)\n- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674)\n- ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674)\n- ixgbevf: use length to determine if descriptor is done (bsc#1101674)\n- ixgbevf: use length to determine if descriptor is done (bsc#1101674)\n- ixgbevf: use page_address offset from page (bsc#1101674)\n- jump_label: Add branch hints to static_branch_{un,}likely() (bnc#1101669 optimise numa balancing for fast migrate)\n- kABI fixes for nvme-if_ready-checks-fail-io-to-deleting-controll.patch (bsc#1077989)\n- kABI fixes for qla2xxx-Fix-inconsistent-DMA-mem-alloc-free.patch (bsc#1077989)\n- kABI: protect ife_tlv_meta_decode (kabi)\n- kABI: protect struct cstate (kabi)\n- kabi cxgb4 MU (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- kabi mlx5 hide cpu_rmap (bsc#1046303)\n- kabi mvpp2 10gkr support (bsc#1098633)\n- kabi protect fwnode_handle (bsc#1098633)\n- kabi/severities: add nvdimm internal symbols to kabi ignore list\n- kabi/severities: add qed inter module symbols to kabi ignore list\n- kcm: Fix use-after-free caused by clonned sockets (networking-stable-18_06_08)\n- kcm: lock lower socket in kcm_attach (networking-stable-18_03_28)\n- kconfig: Avoid format overflow warning from GCC 8.1 (bsc#1051510)\n- kconfig: Do not leak main menus during parsing (bsc#1051510)\n- kconfig: Fix automatic menu creation mem leak (bsc#1051510)\n- kconfig: Fix expr_free() E_NOT leak (bsc#1051510)\n- kernel/params.c: downgrade warning for unsafe parameters (bsc#1051510)\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bsc#1051510)\n- keys: DNS: fix parsing multiple options (bsc#1051510)\n- keys: DNS: limit the length of option strings (networking-stable-18_04_26)\n- kmod: fix wait on recursive loop (bsc#1099792)\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792)\n- kmod: throttle kmod thread limit (bsc#1099792)\n- kobject: do not use WARN for registration failures (bsc#1051510)\n- kvm: PPC: Check if IOMMU page is contained in the pinned physical page (bsc#1077761, git-fixes)\n- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183)\n- kvm: x86: fix vcpu initialization with userspace lapic (bsc#1101564)\n- kvm: x86: move LAPIC initialization after VMCS creation (bsc#1101564)\n- l2tp: check sockaddr length in pppol2tp_connect() (networking-stable-18_04_26)\n- lan78xx: Crash in lan78xx_writ_reg (Workqueue: events lan78xx_deferred_multicast_write) (networking-stable-18_04_10)\n- lib/kobject: Join string literals back (bsc#1051510)\n- lib/string_helpers: Add missed declaration of struct task_struct (bsc#1099918)\n- lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly (bsc#1051510)\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bsc#1051510)\n- libata: Blacklist some Sandisk SSDs for NCQ (bsc#1051510)\n- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bsc#1051510)\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bsc#1051510)\n- libata: zpodd: make arrays cdb static, reduces object code size (bsc#1051510)\n- libata: zpodd: small read overflow in eject_tray() (bsc#1051510)\n- libnvdimm, label: fix index block size calculation (bsc#1102147)\n- libnvdimm, pmem: Add sysfs notifications to badblocks\n- libnvdimm, pmem: Do not flush power-fail protected CPU caches (bsc#1091424)\n- libnvdimm, pmem: Unconditionally deep flush on *sync (bsc#1091424)\n- libnvdimm, region, pmem: fix \u0027badblocks\u0027 sysfs_get_dirent() reference lifetime\n- libnvdimm, region, pmem: fix \u0027badblocks\u0027 sysfs_get_dirent() reference lifetime\n- libnvdimm: add an api to cast a \u0027struct nd_region\u0027 to its \u0027struct device\u0027 (bsc#1094119)\n- llc: better deal with too small mtu (networking-stable-18_05_15)\n- llc: delete timers synchronously in llc_sk_free() (networking-stable-18_04_26)\n- llc: fix NULL pointer deref for SOCK_ZAPPED (networking-stable-18_04_26)\n- llc: hold llc_sap before release_sock() (networking-stable-18_04_26)\n- locking/qspinlock: Ensure node is initialised before updating prev-\u003enext (bsc#1050549)\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bsc#1050549)\n- locking: Remove smp_read_barrier_depends() from queued_spin_lock_slowpath() (bsc#1050549)\n- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bsc#1051510)\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason\n- macvlan: filter out unsupported feature flags (networking-stable-18_03_28)\n- macvlan: fix memory hole in macvlan_dev (bsc#1099918)\n- macvlan: remove unused fields in struct macvlan_dev (bsc#1099918)\n- mailbox: PCC: erroneous error message when parsing acpi PCCT (bsc#1096330)\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush sequence (bsc#1051510)\n- mailbox: bcm-flexrm-mailbox: Fix mask used in CMPL_START_ADDR_VALUE() (bsc#1051510)\n- mailbox: bcm2835: Fix of_xlate return value (bsc#1051510)\n- mailbox: mailbox-test: do not rely on rx_buffer content to signal data ready (bsc#1051510)\n- mdio-sun4i: Fix a memory leak (bsc#1051510)\n- media: coda/imx-vdoa: Check for platform_get_resource() error (bsc#1051510)\n- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bsc#1051510)\n- media: cx25840: Use subdev host data for PLL override (bsc#1051510)\n- media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1051510)\n- media: cxusb: restore RC_MAP for MyGica T230 (bsc#1051510)\n- media: dt-bindings: media: rcar_vin: Use status \u0027okay\u0027 (bsc#1051510)\n- media: dvb-core: always call invoke_release() in fe_free() (bsc#1051510)\n- media: dvb_frontend: fix ifnullfree.cocci warnings (bsc#1051510)\n- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bsc#1051510)\n- media: dvb_frontend: only use kref after initialized (bsc#1051510)\n- media: dvb_net: ensure that dvb_net_ule_handle is fully initialized (bsc#1051510)\n- media: mxl111sf: Fix potential null pointer dereference (bsc#1051510)\n- media: omap3isp/isp: remove an unused static var (bsc#1051510)\n- media: s5p-jpeg: fix number of components macro (bsc#1051510)\n- media: s5p-mfc: Fix lock contention - request_firmware() once (bsc#1051510)\n- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918)\n- media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bsc#1051510)\n- media: uvcvideo: Support realtek\u0027s UVC 1.5 device (bsc#1099109)\n- media: v4l2-compat-ioctl32: prevent go past max size (bsc#1051510)\n- media: vivid: potential integer overflow in vidioc_g_edid() (bsc#1051510)\n- mfd: intel-lpss: Fix Intel Cannon Lake LPSS I2C input clock (bsc#1051510)\n- mfd: intel-lpss: Program REMAP register in PIO mode (bsc#1051510)\n- mfd: tps65218: Reorder tps65218_regulator_id enum (bsc#1051510)\n- mfd: tps65911-comparator: Fix a build error (bsc#1051510)\n- mfd: tps65911-comparator: Fix an off by one bug (bsc#1051510)\n- mlxsw: spectrum: Forbid creation of VLAN 1 over port/LAG (networking-stable-18_06_08)\n- mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic (networking-stable-18_03_28)\n- mlxsw: spectrum_router: Do not log an error on missing neighbor (networking-stable-18_01_28)\n- mlxsw: spectrum_router: Fix error path in mlxsw_sp_vr_create (networking-stable-18_03_07)\n- mlxsw: spectrum_switchdev: Check success of FDB add operation (networking-stable-18_03_07)\n- mm, oom_reaper: skip mm structs with mmu notifiers (bsc#1099918)\n- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (, bsc#1078248)\n- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (bsc#1078248)\n- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (, bsc#1078248)\n- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (bsc#1078248)\n- mm/pkeys: Add an empty arch_pkeys_enabled() (, bsc#1078248)\n- mm/pkeys: Add an empty arch_pkeys_enabled() (bsc#1078248)\n- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (, bsc#1078248)\n- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (bsc#1078248)\n- mmc: Downgrade printk level for MMC SDHCI host version error (bsc#1097941)\n- mmc: cavium: Fix use-after-free in of_platform_device_destroy (bsc#1051510)\n- mmc: dw_mmc: exynos: fix the suspend/resume issue for exynos5433 (bsc#1051510)\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1051510)\n- mmc: meson-gx: remove CLK_DIVIDER_ALLOW_ZERO clock flag (bsc#1051510)\n- mmc: sdhci-msm: fix issue with power irq (bsc#1051510)\n- mmc: sdhci-of-esdhc: disable SD clock for clock value 0 (bsc#1051510)\n- mmc: sdhci-of-esdhc: fix eMMC couldn\u0027t work after kexec (bsc#1051510)\n- mmc: sdhci-of-esdhc: fix the mmc error after sleep on ls1046ardb (bsc#1051510)\n- mmc: sdhci-xenon: Fix clock resource by adding an optional bus clock (bsc#1051510)\n- mmc: sdhci-xenon: wait 5ms after set 1.8V signal enable (bsc#1051510)\n- mmc: tmio: remove outdated comment (bsc#1051510)\n- modsign: log module name in the event of an error (bsc#1093666)\n- modsign: print module name along with error message (bsc#1093666)\n- module: make it clear when we\u0027re handling the module copy in info-\u003ehdr (bsc#1093666)\n- module: setup load info before module_sig_check() (bsc#1093666)\n- mq-deadline: Enable auto-loading when built as module (bsc#1099918)\n- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918)\n- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bsc#1099918)\n- mtd: nand: fsl_ifc: Fix eccstat array overflow for IFC ver \u003e= 2.0.0 (bsc#1099918)\n- mtd: partitions: add helper for deleting partition (bsc#1099918)\n- mtd: partitions: remove sysfs files when deleting all master\u0027s partitions (bsc#1099918)\n- mvpp2: fix multicast address filter (bsc#1098633)\n- n_tty: Access echo_* variables carefully (bsc#1051510)\n- n_tty: Fix stall at n_tty_receive_char_special() (bsc#1051510)\n- nbd: do not start req until after the dead connection logic (bsc#1099918)\n- nbd: fix -ERESTARTSYS handling (bsc#1099918)\n- nbd: fix nbd device deletion (bsc#1099918)\n- nbd: fix return value in error handling path (bsc#1099918)\n- nbd: wait uninterruptible for the dead timeout (bsc#1099918)\n- net sched actions: fix refcnt leak in skbmod (networking-stable-18_05_15)\n- net-sysfs: Fix memory leak in XPS configuration (networking-stable-18_06_08)\n- net/ipv6: Fix route leaking between VRFs (networking-stable-18_04_10)\n- net/ipv6: Increment OUTxxx counters after netfilter hook (networking-stable-18_04_10)\n- net/iucv: Free memory obtained by kzalloc (networking-stable-18_03_28)\n- net/mlx4: Fix irq-unsafe spinlock usage (networking-stable-18_06_08)\n- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300)\n- net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300)\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300)\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300)\n- net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299)\n- net/mlx4_en: Fix an error handling path in \u0027mlx4_en_init_netdev()\u0027 (networking-stable-18_05_15)\n- net/mlx4_en: Verify coalescing parameters are in range (networking-stable-18_05_15)\n- net/mlx5: Adjust clock overflow work period (bsc#1046303)\n- net/mlx5: E-Switch, Include VF rdma stats in vport statistics (networking-stable-18_05_15)\n- net/mlx5: Eswitch, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303)\n- net/mlx5: Eswitch, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303)\n- net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303)\n- net/mlx5: Fix command interface race in polling mode (bsc#1046300)\n- net/mlx5: Fix command interface race in polling mode (bsc#1046300)\n- net/mlx5: Fix dump_command mailbox length printed (bsc#1046303)\n- net/mlx5: Fix incorrect raw command length parsing (bsc#1046300)\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300)\n- net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300)\n- net/mlx5: Free IRQs in shutdown path (bsc#1046303)\n- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303)\n- net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303)\n- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303)\n- net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303)\n- net/mlx5: Protect from command bit overflow (bsc#1046303)\n- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303)\n- net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303)\n- net/mlx5: Vport, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303)\n- net/mlx5: Vport, Use \u0027kvfree()\u0027 for memory allocated by \u0027kvzalloc()\u0027 (bsc#1046303)\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303)\n- net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303)\n- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300)\n- net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300)\n- net/mlx5e: Err if asked to offload TC match on frag being first (networking-stable-18_05_15)\n- net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303)\n- net/mlx5e: Refine ets validation function (bsc#1075360)\n- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303)\n- net/mlx5e: Remove redundant vport context vlan update (bsc#1046303)\n- net/mlx5e: TX, Use correct counter in dma_map error flow (networking-stable-18_05_15)\n- net/mlx5e: When RXFCS is set, add FCS data into checksum calculation (networking-stable-18_06_08)\n- net/packet: refine check for priv area size (networking-stable-18_06_08)\n- net/sched: act_simple: fix parsing of TCA_DEF_DATA (networking-stable-18_06_20)\n- net/sched: act_tunnel_key: fix NULL dereference when \u0027goto chain\u0027 is used (bsc#1056787)\n- net/sched: cls_u32: fix cls_u32 on filter replace (networking-stable-18_03_07)\n- net/sched: fix NULL dereference in the error path of tcf_sample_init() (bsc#1056787)\n- net: Allow neigh contructor functions ability to modify the primary_key (networking-stable-18_01_28)\n- net: Fix hlist corruptions in inet_evict_bucket() (networking-stable-18_03_28)\n- net: Only honor ifindex in IP_PKTINFO if non-0 (networking-stable-18_03_28)\n- net: add rb_to_skb() and other rb tree helpers (bsc#1102340)\n- net: af_packet: fix race in PACKET_{R|T}X_RING (networking-stable-18_04_26)\n- net: cxgb3_main: fix potential Spectre v1 (bsc#1046533)\n- net: define the TSO header size in net/tso.h (bsc#1098633)\n- net: dsa: add error handling for pskb_trim_rcsum (networking-stable-18_06_20)\n- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (networking-stable-18_03_28)\n- net: ethernet: davinci_emac: fix error handling in probe() (networking-stable-18_06_08)\n- net: ethernet: sun: niu set correct packet size in skb (networking-stable-18_05_15)\n- net: ethernet: ti: cpdma: correct error handling for chan create (networking-stable-18_06_08)\n- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (networking-stable-18_03_28)\n- net: ethernet: ti: cpsw: fix net watchdog timeout (networking-stable-18_03_07)\n- net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode (networking-stable-18_05_15)\n- net: ethernet: ti: cpsw: fix tx vlan priority mapping (networking-stable-18_04_26)\n- net: ethtool: Add macro to clear a link mode setting (bsc#1101816)\n- net: ethtool: Add macro to clear a link mode setting (bsc#1101816)\n- net: fec: Fix unbalanced PM runtime calls (networking-stable-18_03_28)\n- net: fix deadlock while clearing neighbor proxy table (networking-stable-18_04_26)\n- net: fix possible out-of-bound read in skb_network_protocol() (networking-stable-18_04_10)\n- net: fool proof dev_valid_name() (networking-stable-18_04_10)\n- net: in virtio_net_hdr only add VLAN_HLEN to csum_start if payload holds vlan (networking-stable-18_06_20)\n- net: ipv4: add missing RTA_TABLE to rtm_ipv4_policy (networking-stable-18_06_08)\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes)\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (networking-stable-18_03_07)\n- net: ipv6: keep sk status consistent after datagram connect failure (networking-stable-18_03_28)\n- net: metrics: add proper netlink validation (networking-stable-18_06_08)\n- net: mvmdio: add xmdio xsmi support (bsc#1098633)\n- net: mvmdio: check the MII_ADDR_C45 bit is not set for smi operations (bsc#1098633)\n- net: mvmdio: introduce an ops structure (bsc#1098633)\n- net: mvmdio: put the poll intervals in the ops structure (bsc#1098633)\n- net: mvmdio: remove duplicate locking (bsc#1098633)\n- net: mvmdio: reorder headers alphabetically (bsc#1098633)\n- net: mvmdio: simplify the smi read and write error paths (bsc#1098633)\n- net: mvmdio: use GENMASK for masks (bsc#1098633)\n- net: mvmdio: use tabs for defines (bsc#1098633)\n- net: mvpp2: Add hardware offloading for VLAN filtering (bsc#1098633)\n- net: mvpp2: Add support for unicast filtering (bsc#1098633)\n- net: mvpp2: Do not use dynamic allocs for local variables (bsc#1098633)\n- net: mvpp2: Fix DMA address mask size (bsc#1098633)\n- net: mvpp2: Fix TCAM filter reserved range (bsc#1098633)\n- net: mvpp2: Fix clk error path in mvpp2_probe (bsc#1098633)\n- net: mvpp2: Fix clock resource by adding an optional bus clock (bsc#1098633)\n- net: mvpp2: Fix clock resource by adding missing mg_core_clk (bsc#1098633)\n- net: mvpp2: Fix parser entry init boundary check (bsc#1098633)\n- net: mvpp2: Make mvpp2_prs_hw_read a parser entry init function (bsc#1098633)\n- net: mvpp2: Prevent userspace from changing TX affinities (bsc#1098633)\n- net: mvpp2: Simplify MAC filtering function parameters (bsc#1098633)\n- net: mvpp2: Use relaxed I/O in data path (bsc#1098633)\n- net: mvpp2: add comments about smp_processor_id() usage (bsc#1098633)\n- net: mvpp2: add ethtool GOP statistics (bsc#1098633)\n- net: mvpp2: add support for TX interrupts and RX queue distribution modes (bsc#1098633)\n- net: mvpp2: adjust the coalescing parameters (bsc#1098633)\n- net: mvpp2: align values in ethtool get_coalesce (bsc#1098633)\n- net: mvpp2: allocate zeroed tx descriptors (bsc#1098633)\n- net: mvpp2: check ethtool sets the Tx ring size is to a valid min value (bsc#1098633)\n- net: mvpp2: cleanup probed ports in the probe error path (bsc#1098633)\n- net: mvpp2: do not call txq_done from the Tx path when Tx irqs are used (bsc#1098633)\n- net: mvpp2: do not disable GMAC padding (bsc#1098633)\n- net: mvpp2: do not select the internal source clock (bsc#1098633)\n- net: mvpp2: do not set GMAC autoneg when using XLG MAC (bsc#1098633)\n- net: mvpp2: do not sleep in set_rx_mode (bsc#1098633)\n- net: mvpp2: do not unmap TSO headers buffers (bsc#1098633)\n- net: mvpp2: dynamic reconfiguration of the comphy/GoP/MAC (bsc#1098633)\n- net: mvpp2: enable UDP/TCP checksum over IPv6 (bsc#1098633)\n- net: mvpp2: enable acpi support in the driver (bsc#1098633)\n- net: mvpp2: enable basic 10G support (bsc#1098633)\n- net: mvpp2: fallback using h/w and random mac if the dt one isn\u0027t valid (bsc#1098633)\n- net: mvpp2: fix GOP statistics loop start and stop conditions (bsc#1098633)\n- net: mvpp2: fix MVPP21_ISR_RXQ_GROUP_REG definition (bsc#1098633)\n- net: mvpp2: fix TSO headers allocation and management (bsc#1098633)\n- net: mvpp2: fix invalid parameters order when calling the tcam init (bsc#1098633)\n- net: mvpp2: fix parsing fragmentation detection (bsc#1098633)\n- net: mvpp2: fix port list indexing (bsc#1098633)\n- net: mvpp2: fix the RSS table entry offset (bsc#1098633)\n- net: mvpp2: fix the packet size configuration for 10G (bsc#1098633)\n- net: mvpp2: fix the synchronization module bypass macro name (bsc#1098633)\n- net: mvpp2: fix the txq_init error path (bsc#1098633)\n- net: mvpp2: fix typo in the tcam setup (bsc#1098633)\n- net: mvpp2: fix use of the random mac address for PPv2.2 (bsc#1098633)\n- net: mvpp2: improve the link management function (bsc#1098633)\n- net: mvpp2: initialize the GMAC when using a port (bsc#1098633)\n- net: mvpp2: initialize the GoP (bsc#1098633)\n- net: mvpp2: initialize the RSS tables (bsc#1098633)\n- net: mvpp2: initialize the Tx FIFO size (bsc#1098633)\n- net: mvpp2: initialize the XLG MAC when using a port (bsc#1098633)\n- net: mvpp2: initialize the comphy (bsc#1098633)\n- net: mvpp2: introduce per-port nrxqs/ntxqs variables (bsc#1098633)\n- net: mvpp2: introduce queue_vector concept (bsc#1098633)\n- net: mvpp2: jumbo frames support (bsc#1098633)\n- net: mvpp2: limit TSO segments and use stop/wake thresholds (bsc#1098633)\n- net: mvpp2: make the phy optional (bsc#1098633)\n- net: mvpp2: move from cpu-centric naming to \u0027software thread\u0027 naming (bsc#1098633)\n- net: mvpp2: move the mac retrieval/copy logic into its own function (bsc#1098633)\n- net: mvpp2: move the mii configuration in the ndo_open path (bsc#1098633)\n- net: mvpp2: mvpp2_check_hw_buf_num() can be static (bsc#1098633)\n- net: mvpp2: only free the TSO header buffers when it was allocated (bsc#1098633)\n- net: mvpp2: remove RX queue group reset code (bsc#1098633)\n- net: mvpp2: remove mvpp2_pool_refill() (bsc#1098633)\n- net: mvpp2: remove unused mvpp2_bm_cookie_pool_set() function (bsc#1098633)\n- net: mvpp2: remove useless goto (bsc#1098633)\n- net: mvpp2: report the tx-usec coalescing information to ethtool (bsc#1098633)\n- net: mvpp2: set maximum packet size for 10G ports (bsc#1098633)\n- net: mvpp2: set the Rx FIFO size depending on the port speeds for PPv2.2 (bsc#1098633)\n- net: mvpp2: simplify maintaining enabled ports\u0027 list (bsc#1098633)\n- net: mvpp2: simplify the Tx desc set DMA logic (bsc#1098633)\n- net: mvpp2: simplify the link_event function (bsc#1098633)\n- net: mvpp2: software tso support (bsc#1098633)\n- net: mvpp2: split the max ring size from the default one (bsc#1098633)\n- net: mvpp2: take advantage of the is_rgmii helper (bsc#1098633)\n- net: mvpp2: unify register definitions coding style (bsc#1098633)\n- net: mvpp2: unify the txq size define use (bsc#1098633)\n- net: mvpp2: update the BM buffer free/destroy logic (bsc#1098633)\n- net: mvpp2: use a data size of 10kB for Tx FIFO on port 0 (bsc#1098633)\n- net: mvpp2: use correct index on array mvpp2_pools (bsc#1098633)\n- net: mvpp2: use device_*/fwnode_* APIs instead of of_* (bsc#1098633)\n- net: mvpp2: use the GoP interrupt for link status changes (bsc#1098633)\n- net: mvpp2: use the aggr txq size define everywhere (bsc#1098633)\n- net: mvpp2: use the same buffer pool for all ports (bsc#1098633)\n- net: phy: Tell caller result of phy_change() (networking-stable-18_03_28)\n- net: phy: add XAUI and 10GBASE-KR PHY connection types (bsc#1098633)\n- net: phy: broadcom: Fix auxiliary control register reads (networking-stable-18_06_08)\n- net: phy: broadcom: Fix bcm_write_exp() (networking-stable-18_06_08)\n- net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE for DP83620 (networking-stable-18_06_20)\n- net: phy: fix phy_start to consider PHY_IGNORE_INTERRUPT (networking-stable-18_03_07)\n- net: qdisc_pkt_len_init() should be more robust (networking-stable-18_01_28)\n- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301)\n- net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301)\n- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319)\n- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319)\n- net: sched: fix error path in tcf_proto_create() when modules are not configured (networking-stable-18_05_15)\n- net: sched: ife: check on metadata length (networking-stable-18_04_26)\n- net: sched: ife: handle malformed tlv length (networking-stable-18_04_26)\n- net: sched: ife: signal not finding metaid (networking-stable-18_04_26)\n- net: sched: red: avoid hashing NULL child (bsc#1056787)\n- net: sched: report if filter is too large to dump (networking-stable-18_03_07)\n- net: support compat 64-bit time in {s,g}etsockopt (networking-stable-18_05_15)\n- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (networking-stable-18_03_28)\n- net: tcp: close sock if net namespace is exiting (networking-stable-18_01_28)\n- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (networking-stable-18_06_08)\n- net: validate attribute sizes in neigh_dump_table() (networking-stable-18_04_26)\n- net: vrf: Add support for sends to local broadcast address (networking-stable-18_01_28)\n- net_sched: fq: take care of throttled flows before reuse (networking-stable-18_05_15)\n- netdev-FAQ: clarify DaveM\u0027s position for stable backports (networking-stable-18_06_08)\n- netlink: avoid a double skb free in genlmsg_mcast() (git-fixes)\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (networking-stable-18_03_07)\n- netlink: extack needs to be reset each time through loop (networking-stable-18_01_28)\n- netlink: make sure nladdr has correct size in netlink_connect() (networking-stable-18_04_10)\n- netlink: reset extack earlier in netlink_rcv_skb (networking-stable-18_01_28)\n- nfc: llcp: Limit size of SDP URI (bsc#1051510)\n- nfc: nfcmrvl_uart: fix device-node leak during probe (bsc#1051510)\n- nfc: pn533: Fix wrong GFP flag usage (bsc#1051510)\n- nfc: pn533: do not send usb data off of the stack (bsc#1051510)\n- nfit, address-range-scrub: add module option to skip initial ars (bsc#1094119)\n- nfit, address-range-scrub: determine one platform max_ars value (bsc#1094119)\n- nfit, address-range-scrub: fix scrub in-progress reporting (bsc#1051510)\n- nfit, address-range-scrub: introduce nfit_spa-\u003ears_state (bsc#1094119)\n- nfit, address-range-scrub: rework and simplify ARS state machine (bsc#1094119)\n- nfit: fix region registration vs block-data-window ranges (bsc#1051510)\n- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1051510)\n- nfs: Revert \u0027NFS: Move the flock open mode check into nfs_flock()\u0027 (bsc#1098983)\n- nfsv4: Revert commit 5f83d86cf531d (\u0027NFSv4.x: Fix wraparound issues..\u0027) (git-fixes)\n- nl80211: relax ht operation checks for mesh (bsc#1051510)\n- nubus: Avoid array underflow and overflow (bsc#1099918)\n- nubus: Fix up header split (bsc#1099918)\n- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098706)\n- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098706)\n- nvme-fabrics: centralize discovery controller defaults (bsc#1098706)\n- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098706)\n- nvme-fabrics: handle the admin-only case properly in nvmf_check_ready (bsc#1098706)\n- nvme-fabrics: refactor queue ready check (bsc#1098706)\n- nvme-fabrics: remove unnecessary controller subnqn validation (bsc#1098706)\n- nvme-fc: change controllers first connect to use reconnect path (bsc#1098706)\n- nvme-fc: fix nulling of queue data on reconnect (bsc#1098706)\n- nvme-fc: release io queues to allow fast fail (bsc#1098706)\n- nvme-fc: remove reinit_request routine (bsc#1098706)\n- nvme-fc: remove setting DNR on exception conditions (bsc#1098706)\n- nvme-loop: add support for multiple ports (bsc#1054245)\n- nvme-multipath: fix sysfs dangerously created links (bsc#1096529)\n- nvme-rdma: Fix command completion race at error recovery (bsc#1099041)\n- nvme-rdma: correctly check for target keyed sgl support (bsc#1099041)\n- nvme-rdma: do not override opts-\u003equeue_size (bsc#1099041)\n- nvme-rdma: fix error flow during mapping request data (bsc#1099041)\n- nvme-rdma: fix possible double free condition when failing to create a controller (bsc#1099041)\n- nvme.h: add AEN configuration symbols (bsc#1054245)\n- nvme.h: add ANA definitions (bsc#1054245)\n- nvme.h: add support for the log specific field (bsc#1054245)\n- nvme.h: add the changed namespace list log (bsc#1054245)\n- nvme.h: untangle AEN notice definitions (bsc#1054245)\n- nvme/multipath: Disable runtime writable enabling parameter (bsc#1054245)\n- nvme/multipath: Fix multipath disabled naming collisions (bsc#1098706)\n- nvme: Fix sync controller reset return (bsc#1077989)\n- nvme: Revert \u0027nvme: mark nvme_queue_scan static\u0027 (bsc#1054245)\n- nvme: Set integrity flag for user passthrough commands (bsc#1098706)\n- nvme: Skip checking heads without namespaces (bsc#1098706)\n- nvme: Use admin command effects for admin commands (bsc#1098706)\n- nvme: add ANA support (bsc#1054245)\n- nvme: add bio remapping tracepoint (bsc#1054245)\n- nvme: allow duplicate controller if prior controller being deleted (bsc#1098706)\n- nvme: centralize ctrl removal prints (bsc#1054245)\n- nvme: check return value of init_srcu_struct function (bsc#1098706)\n- nvme: cleanup double shift issue (bsc#1054245)\n- nvme: do not enable AEN if not supported (bsc#1077989)\n- nvme: do not hold nvmf_transports_rwsem for more than transport lookups (bsc#1054245)\n- nvme: do not rely on the changed namespace list log (bsc#1054245)\n- nvme: enforce 64bit offset for nvme_get_log_ext fn (bsc#1054245)\n- nvme: expand nvmf_check_if_ready checks (bsc#1098706)\n- nvme: fix NULL pointer dereference in nvme_init_subsystem (bsc#1098706)\n- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD\n- nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD (,)\n- nvme: fix potential memory leak in option parsing (bsc#1098706)\n- nvme: fix use-after-free in nvme_free_ns_head (bsc#1054245)\n- nvme: guard additional fields in nvme command structures (bsc#1054245)\n- nvme: host: core: fix precedence of ternary operator (bsc#1054245)\n- nvme: if_ready checks to fail io to deleting controller (bsc#1077989)\n- nvme: implement log page low/high offset and dwords (bsc#1054245)\n- nvme: kABI fix for ANA support in nvme_ctrl (bsc#1054245)\n- nvme: kABI fixes for nvmet_ctrl (bsc#1054245)\n- nvme: kabi fixes for nvme_ctrl (bsc#1054245)\n- nvme: make nvme_get_log_ext non-static (bsc#1054245)\n- nvme: mark nvme_queue_scan static (bsc#1054245)\n- nvme: move init of keep_alive work item to controller initialization (bsc#1098706)\n- nvme: partially revert \u0027nvme: remove nvme_req_needs_failover\u0027 (bsc#1054245)\n- nvme: reintruduce nvme_get_log_ext() (bsc#1054245)\n- nvme: remove nvme_req_needs_failover (bsc#1054245)\n- nvme: simplify the API for getting log pages (bsc#1054245)\n- nvme: submit AEN event configuration on startup (bsc#1054245)\n- nvme: use the changed namespaces list log to clear ns data changed AENs (bsc#1054245)\n- nvmet-fc: fix target sgl list on large transfers\n- nvmet-fc: fix target sgl list on large transfers (,)\n- nvmet-fc: increase LS buffer count per fc port (bsc#1098706)\n- nvmet: Revert \u0027nvmet: constify struct nvmet_fabrics_ops\u0027 (bsc#1054245)\n- nvmet: add AEN configuration support (bsc#1054245)\n- nvmet: add a new nvmet_zero_sgl helper (bsc#1054245)\n- nvmet: add minimal ANA support (bsc#1054245)\n- nvmet: constify struct nvmet_fabrics_ops (bsc#1054245)\n- nvmet: filter newlines from user input (bsc#1054245)\n- nvmet: fixup crash on NULL device path (bsc#1054245)\n- nvmet: implement the changed namespaces log (bsc#1054245)\n- nvmet: kABI fixes for ANA support (bsc#1054245)\n- nvmet: keep a port pointer in nvmet_ctrl (bsc#1054245)\n- nvmet: mask pending AENs (bsc#1054245)\n- nvmet: reset keep alive timer in controller enable (bsc#1054245)\n- nvmet: return all zeroed buffer when we can\u0027t find an active namespace (bsc#1054245)\n- nvmet: split log page implementation (bsc#1054245)\n- nvmet: support configuring ANA groups (bsc#1054245)\n- nvmet: switch loopback target state to connecting when resetting (bsc#1098706)\n- nvmet: track and limit the number of namespaces per subsystem (1054245)\n- nvmet: use Retain Async Event bit to clear AEN (bsc#1054245)\n- of/pci: Fix theoretical NULL dereference (bsc#1051510)\n- of: Make of_fwnode_handle() safer (bsc#1098633)\n- of: fix DMA mask generation (bsc#1051510)\n- of: overlay: validate offset from property fixups (bsc#1051510)\n- of: platform: stop accessing invalid dev in of_platform_device_destroy (bsc#1051510)\n- of: restrict DMA configuration (bsc#1051510)\n- of: unittest: for strings, account for trailing \\0 in property length field (bsc#1051510)\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (networking-stable-18_05_15)\n- p54: do not unregister leds when they are not initialized (bsc#1051510)\n- packet: fix bitfield update race (networking-stable-18_04_26)\n- pci: Account for all bridges on bus when distributing bus numbers (bsc#1100132)\n- pci: Add ACS quirk for Intel 300 series (bsc#1051510)\n- pci: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510)\n- pci: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510)\n- pci: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510)\n- pci: Restore config space on runtime resume despite being unbound (bsc#1051510)\n- pci: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510)\n- pci: aardvark: Fix pcie Max Read Request Size setting (bsc#1051510)\n- pci: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510)\n- pci: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510)\n- pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1051510)\n- pci: dwc: Fix enumeration end when reaching root subordinate (bsc#1100132)\n- pci: endpoint: Fix kernel panic after put_device() (bsc#1051510)\n- pci: endpoint: Populate func_no before calling pci_epc_add_epf() (bsc#1051510)\n- pci: exynos: Fix a potential init_clk_resources NULL pointer dereference (bsc#1051510)\n- pci: faraday: Fix of_irq_get() error check (bsc#1051510)\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1051510)\n- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510)\n- pci: shpchp: Fix AMD POGO identification (bsc#1051510)\n- perf intel-pt: Always set no branch for dummy event (bsc#1087217)\n- perf intel-pt: Set no_aux_samples for the tracking event (bsc#1087217)\n- perf/x86/intel/uncore: Add event constraint for BDX PCU (bsc#1087202)\n- perf/x86/intel/uncore: Fix SKX CHA event extra regs (bsc#1087233)\n- perf/x86/intel/uncore: Fix Skylake UPI PMU event masks (bsc#1087233)\n- perf/x86/intel/uncore: Fix Skylake server CHA LLC_LOOKUP event umask (bsc#1087233)\n- perf/x86/intel/uncore: Fix Skylake server PCU PMU event format (bsc#1087233)\n- perf/x86/intel/uncore: Fix missing marker for skx_uncore_cha_extra_regs (bsc#1087233)\n- perf/x86/intel/uncore: Remove invalid Skylake server CHA filter field (bsc#1087233)\n- perf/x86: Fix data source decoding for Skylake\n- phy: add sgmii and 10gkr modes to the phy_mode enum (bsc#1098633)\n- pinctrl/amd: Fix build dependency on pinmux code (bsc#1051510)\n- pinctrl/amd: save pin registers over suspend/resume (bsc#1051510)\n- pinctrl: adi2: Fix Kconfig build problem (bsc#1051510)\n- pinctrl: armada-37xx: Fix direction_output() callback behavior (bsc#1051510)\n- pinctrl: artpec6: dt: add missing pin group uart5nocts (bsc#1051510)\n- pinctrl: bcm2835: Avoid warning from __irq_do_set_handler (bsc#1051510)\n- pinctrl: imx: fix debug message for SHARE_MUX_CONF_REG case (bsc#1051510)\n- pinctrl: intel: Initialize GPIO properly when used through irqchip (bsc#1087092)\n- pinctrl: intel: Read back TX buffer state (bsc#1051510)\n- pinctrl: meson-gxbb: remove non-existing pin GPIOX_22 (bsc#1051510)\n- pinctrl: meson-gxl: Fix typo in AO I2S pins (bsc#1051510)\n- pinctrl: meson-gxl: Fix typo in AO SPDIF pins (bsc#1051510)\n- pinctrl: mvebu: use correct MPP sel value for dev pins (bsc#1051510)\n- pinctrl: nand: meson-gxbb: fix missing data pins (bsc#1051510)\n- pinctrl: nsp: Fix potential NULL dereference (bsc#1051510)\n- pinctrl: nsp: off by ones in nsp_pinmux_enable() (bsc#1100132)\n- pinctrl: pinctrl-single: Fix pcs_request_gpio() when bits_per_mux != 0 (bsc#1051510)\n- pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510)\n- pinctrl: rockchip: enable clock when reading pin direction register (bsc#1051510)\n- pinctrl: samsung: Fix NULL pointer exception on external interrupts on S3C24xx (bsc#1051510)\n- pinctrl: samsung: Fix invalid register offset used for Exynos5433 external interrupts (bsc#1051510)\n- pinctrl: sh-pfc: r8a7790: Add missing TX_ER pin to avb_mii group (bsc#1051510)\n- pinctrl: sh-pfc: r8a7795-es1: Fix MOD_SEL1 bit[25:24] to 0x3 when using STP_ISEN_1_D (bsc#1051510)\n- pinctrl: sh-pfc: r8a7795: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510)\n- pinctrl: sh-pfc: r8a7795: Fix to delete A20..A25 pins function definitions (bsc#1051510)\n- pinctrl: sh-pfc: r8a7796: Fix IPSR and MOD_SEL register pin assignment for NDFC pins group (bsc#1051510)\n- pinctrl: sh-pfc: r8a7796: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510)\n- pinctrl: sh-pfc: r8a7796: Fix to delete A20..A25 pins function definitions (bsc#1051510)\n- pinctrl: sh-pfc: r8a7796: Fix to delete FSCLKST pin and IPSR7 bit[15:12] register definitions (bsc#1051510)\n- pinctrl: sunxi: Fix A64 UART mux value (bsc#1051510)\n- pinctrl: sunxi: Fix A80 interrupt pin bank (bsc#1051510)\n- pinctrl: sunxi: fix V3s pinctrl driver IRQ bank base (bsc#1051510)\n- pinctrl: sunxi: fix wrong irq_banks number for H5 pinctrl (bsc#1051510)\n- pinctrl: sx150x: Add a static gpio/pinctrl pin range mapping (bsc#1051510)\n- pinctrl: sx150x: Register pinctrl before adding the gpiochip (bsc#1051510)\n- pinctrl: sx150x: Unregister the pinctrl on release (bsc#1051510)\n- pinctrl: uniphier: fix members of rmii group for Pro4 (bsc#1051510)\n- pinctrl: uniphier: fix pin_config_get() for input-enable (bsc#1051510)\n- pipe: fix off-by-one error when checking buffer limits (bsc#1051510)\n- pktcdvd: Fix a recently introduced NULL pointer dereference (bsc#1099918)\n- pktcdvd: Fix pkt_setup_dev() error path (bsc#1099918)\n- platform/chrome: cros_ec_lpc: remove redundant pointer request (bsc#1051510)\n- platform/x86: asus-wmi: Fix NULL pointer dereference (bsc#1051510)\n- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too (bsc#1098626)\n- pm/core: Fix supplier device runtime PM usage counter imbalance (bsc#1051510)\n- pm/hibernate: Fix oops at snapshot_write() (bsc#1051510)\n- pm/hibernate: Use CONFIG_HAVE_SET_MEMORY for include condition (bsc#1051510)\n- pm/wakeup: Only update last time for active wakeup sources (bsc#1051510)\n- power: gemini-poweroff: Avoid spurious poweroff (bsc#1051510)\n- power: supply: act8945a_charger: fix of_irq_get() error check (bsc#1051510)\n- power: supply: cpcap-charger: add OMAP_usb2 dependency (bsc#1051510)\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382)\n- powerpc/64s: Clear PCR on boot (bnc#1012382)\n- powerpc/64s: Fix mce accounting for powernv (bsc#1094244)\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041)\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382)\n- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382)\n- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382)\n- powerpc/mm: Fix thread_pkey_regs_init() (, bsc#1078248, git-fixes)\n- powerpc/mm: Fix thread_pkey_regs_init() (bsc#1078248, git-fixes)\n- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382)\n- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (, bsc#1078248, git-fixes)\n- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (bsc#1078248, git-fixes)\n- powerpc/pkeys: Drop private VM_PKEY definitions (, bsc#1078248)\n- powerpc/pkeys: Drop private VM_PKEY definitions (bsc#1078248)\n- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382)\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382)\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382)\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382)\n- powerpc/ptrace: Fix enforcement of DAWR constraints (bsc#1099918)\n- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382)\n- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382)\n- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244)\n- powerpc: mmu_context: provide old version of mm_iommu_ua_to_hpa (bsc#1077761, git-fixes)\n- ppp: avoid loop in xmit recursion detection code (networking-stable-18_03_28)\n- ppp: prevent unregistered channels from connecting to PPP units (networking-stable-18_03_07)\n- ppp: unlock all_ppp_mutex before registering device (networking-stable-18_01_28)\n- pppoe: check sockaddr length in pppoe_connect() (networking-stable-18_04_26)\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (networking-stable-18_01_28)\n- pptp: remove a buggy dst release in pptp_connect() (networking-stable-18_04_10)\n- printk: fix possible reuse of va_list variable (bsc#1100602)\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652)\n- pty: cancel pty slave port buf\u0027s work in tty_release (bsc#1051510)\n- pwm: lpss: platform: Save/restore the ctrl register over a suspend/resume (bsc#1051510)\n- pwm: meson: Fix allocation of PWM channel array (bsc#1051510)\n- pwm: meson: Improve PWM calculation precision (bsc#1051510)\n- pwm: rcar: Fix a condition to prevent mismatch value setting to duty (bsc#1051510)\n- pwm: stm32: Enforce dependency on CONFIG_MFD_STM32_TIMERS (bsc#1051510)\n- pwm: stm32: Remove unused struct device (bsc#1051510)\n- pwm: stmpe: Fix wrong register offset for hwpwm=2 case (bsc#1051510)\n- pwm: tiehrpwm: Fix runtime PM imbalance at unbind (bsc#1051510)\n- pwm: tiehrpwm: fix clock imbalance in probe error path (bsc#1051510)\n- qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Advance drivers\u0027 version to 8.33.0.20 (bsc#1086314)\n- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add sanity check for SIMD fastpath handler (bsc#1050536)\n- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536)\n- qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536)\n- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536)\n- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536)\n- qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536)\n- qed: Fix mask for physical address in ILT entry (networking-stable-18_06_08)\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix possible memory leak in Rx error path handling (bsc#1050536)\n- qed: Fix possible memory leak in Rx error path handling (bsc#1050536)\n- qed: Fix possible race for the link state value (bsc#1050536)\n- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix reading stale configuration information (bsc#1086314)\n- qed: Fix setting of incorrect eswitch mode (bsc#1050536)\n- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Fix use of incorrect size in memcpy call (bsc#1050536)\n- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536)\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536)\n- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Remove unused data member \u0027is_mf_default\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Remove unused data member \u0027is_mf_default\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: fix spelling mistake: \u0027checksumed\u0027 -\u003e \u0027checksummed\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: fix spelling mistake: \u0027checksumed\u0027 -\u003e \u0027checksummed\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: fix spelling mistake: \u0027offloded\u0027 -\u003e \u0027offloaded\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: fix spelling mistake: \u0027offloded\u0027 -\u003e \u0027offloaded\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: fix spelling mistake: \u0027taskelt\u0027 -\u003e \u0027tasklet\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: fix spelling mistake: \u0027taskelt\u0027 -\u003e \u0027tasklet\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301)\n- qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538)\n- qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538)\n- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qede: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qedr: Fix spelling mistake: \u0027hanlde\u0027 -\u003e \u0027handle\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qedr: Fix spelling mistake: \u0027hanlde\u0027 -\u003e \u0027handle\u0027 (bsc#1086314 bsc#1086313 bsc#1086301)\n- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301)\n- qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301)\n- qlogic: check kstrtoul() for errors (bsc#1050540)\n- qmi_wwan: Add support for Quectel EP06 (networking-stable-18_02_06)\n- qmi_wwan: add support for Quectel EG91 (bsc#1051510)\n- qmi_wwan: add support for the Dell Wireless 5821e module (bsc#1051510)\n- qmi_wwan: fix interface number for DW5821e production firmware (bsc#1051510)\n- qmi_wwan: set FLAG_SEND_ZLP to avoid network initiated disconnect (bsc#1051510)\n- r8152: fix tx packets accounting (bsc#1051510)\n- r8152: napi hangup fix after disconnect (bsc#1051510)\n- r8169: Be drop monitor friendly (bsc#1051510)\n- rbd: flush rbd_dev-\u003ewatch_dwork after watch is unregistered (bsc#1103216)\n- rdma/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283)\n- rdma/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283)\n- rdma/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283)\n- rdma/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283)\n- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306)\n- rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306)\n- rdma/cma: Fix use after destroy access to net namespace for IPoIB (bsc#1046306)\n- rdma/cma: Fix use after destroy access to net namespace for IPoIB (bsc#1046306)\n- rdma/cxgb4: Use structs to describe the uABI instead of opencoding (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- rdma/cxgb4: release hw resources on device removal (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659)\n- rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659)\n- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659)\n- rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659)\n- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307)\n- rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307)\n- rdma/iwpm: fix memory leak on map_info (bsc#1046306)\n- rdma/mlx4: Discard unknown SQP work requests (bsc#1046302)\n- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305)\n- rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305)\n- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305)\n- rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305)\n- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305)\n- rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305)\n- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305)\n- rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305)\n- rdma/mlx5: Protect from shift operand overflow (bsc#1046305)\n- rdma/mlx5: Use proper spec flow label type (bsc#1046305)\n- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix kernel panic when running fio over NFSordma (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301)\n- rdma/ucma: Do not allow setting rdma_OPTION_IB_PATH without an rdma device (bsc#1046306)\n- rdma/ucma: Do not allow setting rdma_OPTION_IB_PATH without an rdma device (bsc#1046306)\n- rdma/ucma: ucma_context reference leak in error path (bsc#1046306)\n- rdma/ucma: ucma_context reference leak in error path (bsc#1046306)\n- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306)\n- rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306)\n- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306)\n- rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306)\n- rds: MP-RDS may use an invalid c_path (networking-stable-18_04_13)\n- rds: do not leak kernel memory to user land (networking-stable-18_05_15)\n- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099029)\n- regulator: max8998: Fix platform data retrieval (bsc#1051510)\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bsc#1051510)\n- regulator: qcom_spmi: Include offset when translating voltages (bsc#1051510)\n- regulator: tps65218: Fix strobe assignment (bsc#1051510)\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599)\n- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340)\n- rocker: fix possible null pointer dereference in rocker_router_fib_event_work (networking-stable-18_02_06)\n- route: check sysctl_fib_multipath_use_neigh earlier than hash (networking-stable-18_04_10)\n- rpm/config.sh: Use SUSE:SLE-15:Update project instead of GA\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far\n- rpm/kernel-source.changes.old: Add pre-SLE15 history (bsc#1098995)\n- rpm/kernel-source.spec.in: Add more stuff to Recommends ... and move bc to Recommends as well. All these packages are needed for building a kernel manually from scratch with kernel-source files\n- rpm/kernel-source.spec.in: require bc for kernel-source This is needed for building include/generated/timeconst.h from kernel/time/timeconst.bc\n- rpm: ignore CONFIG_GCC_VERSION when checking for oldconfig changes Since 4.18-rc1, \u0027make oldconfig\u0027 writes gcc version and capabilities into generated .config. Thus whenever we build the package or run checks with different gcc version than used to update config/*/*, check for \u0027outdated configs\u0027 fails. As a quick band-aid, omit the lines with CONFIG_GCC_VERSION from both configs before comparing them. This way, the check won\u0027t fail unless run with newer gcc which would add new capabilities. More robust solution will require a wider discussion\n- rtc: ac100: Fix ac100 determine rate bug (bsc#1051510)\n- rtc: hctosys: Ensure system time does not overflow time_t (bsc#1051510)\n- rtc: pxa: fix probe function (bsc#1051510)\n- rtc: snvs: Fix usage of snvs_rtc_enable (bsc#1051510)\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bsc#1051510)\n- rtlwifi: Fix kernel Oops \u0027Fw download fail!!\u0027 (bsc#1051510)\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bsc#1051510)\n- rtnetlink: validate attributes in do_setlink() (networking-stable-18_06_08)\n- rxrpc: Fix send in rxrpc_send_data_packet() (networking-stable-18_03_07)\n- s390/crc32-vx: use expoline for indirect branches (git-fixes f19fbd5ed6)\n- s390/ftrace: use expoline for indirect branches (git-fixes f19fbd5ed6)\n- s390/gs: add compat regset for the guarded storage broadcast control block (git-fixes e525f8a6e696)\n- s390/kernel: use expoline for indirect branches (git-fixes f19fbd5ed6)\n- s390/lib: use expoline for indirect branches (git-fixes f19fbd5ed6)\n- s390/qdio: do not merge ERROR output buffers (bsc#1099715)\n- s390/qdio: do not retry EQBS after CCQ 96 (bsc#1102088, LTC#169699)\n- s390/qeth: do not dump control cmd twice (bsc#1099715)\n- s390/qeth: fix IPA command submission race (bsc#1099715)\n- s390/qeth: fix IPA command submission race (networking-stable-18_03_07)\n- s390/qeth: fix error handling in adapter command callbacks (bsc#1102088, LTC#169699)\n- s390/qeth: fix overestimated count of buffer elements (bsc#1099715)\n- s390/qeth: fix overestimated count of buffer elements (networking-stable-18_03_07)\n- s390/qeth: fix race when setting MAC address (bnc#1093148, LTC#167307)\n- s390/qeth: free netdevice when removing a card (bsc#1099715)\n- s390/qeth: free netdevice when removing a card (networking-stable-18_03_28)\n- s390/qeth: lock read device while queueing next buffer (bsc#1099715)\n- s390/qeth: lock read device while queueing next buffer (networking-stable-18_03_28)\n- s390/qeth: when thread completes, wake up all waiters (bsc#1099715)\n- s390/qeth: when thread completes, wake up all waiters (networking-stable-18_03_28)\n- s390: Correct register corruption in critical section cleanup (git-fixes 6dd85fbb87)\n- s390: add assembler macros for CPU alternatives (git-fixes f19fbd5ed6)\n- s390: correct module section names for expoline code revert (git-fixes f19fbd5ed6)\n- s390: extend expoline to BC instructions (git-fixes, bsc#1103421)\n- s390: move expoline assembler macros to a header (git-fixes f19fbd5ed6)\n- s390: move spectre sysfs attribute code (bsc#1090098)\n- s390: optimize memset implementation (git-fixes f19fbd5ed6)\n- s390: remove indirect branch from do_softirq_own_stack (git-fixes f19fbd5ed6)\n- s390: use expoline thunks in the BPF JIT (git-fixes, bsc#1103421)\n- sch_netem: fix skb leak in netem_enqueue() (networking-stable-18_03_28)\n- sched/core: Optimize ttwu_stat() (bnc#1101669 optimise numa balancing for fast migrate)\n- sched/core: Optimize update_stats_*() (bnc#1101669 optimise numa balancing for fast migrate)\n- scripts/dtc: fix \u0027%zx\u0027 warning (bsc#1051510)\n- scripts/gdb/linux/tasks.py: fix get_thread_info (bsc#1051510)\n- scripts/git_sort/git_sort.py: Add \u0027nvme-4.18\u0027 to the list of repositories\n- scripts/git_sort/git_sort.py: add modules-next tree\n- scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bsc#1051510)\n- scsi: Revert \u0027scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()\u0027 (bsc#1099918)\n- scsi: aacraid: Correct hba_send to include iu_type (bsc#1077989)\n- scsi: core: clean up generated file scsi_devinfo_tbl.c (bsc#1077989)\n- scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte() (bsc#1099918)\n- scsi: cxgb4i: silence overflow warning in t4_uld_rx_handler() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961)\n- scsi: ipr: new IOASC update (bsc#1097961)\n- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088866)\n- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1088866)\n- scsi: lpfc: Comment cleanup regarding Broadcom copyright header (bsc#1088866)\n- scsi: lpfc: Correct fw download error message (bsc#1088866)\n- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088866)\n- scsi: lpfc: Correct target queue depth application changes (bsc#1088866)\n- scsi: lpfc: Driver NVME load fails when CPU cnt \u003e WQ resource cnt (bsc#1088866)\n- scsi: lpfc: Enhance log messages when reporting CQE errors (bsc#1088866)\n- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088866)\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1093290)\n- scsi: lpfc: Fix Abort request WQ selection (bsc#1088866)\n- scsi: lpfc: Fix MDS diagnostics failure (bsc#1088866)\n- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088866)\n- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088866)\n- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1088866)\n- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088866)\n- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088866)\n- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088866)\n- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088866)\n- scsi: lpfc: Fix port initialization failure (bsc#1093290)\n- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1088866)\n- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1088866)\n- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1088866)\n- scsi: lpfc: enhance LE data structure copies to hardware (bsc#1088866)\n- scsi: lpfc: fix spelling mistakes: \u0027mabilbox\u0027 and \u0027maibox\u0027 (bsc#1088866)\n- scsi: lpfc: update driver version to 12.0.0.2 (bsc#1088866)\n- scsi: lpfc: update driver version to 12.0.0.3 (bsc#1088866)\n- scsi: lpfc: update driver version to 12.0.0.4 (bsc#1088866)\n- scsi: megaraid_sas: Do not log an error if FW successfully initializes (bsc#1077989)\n- scsi: qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1077989)\n- scsi: qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1077338)\n- scsi: sg: mitigate read/write abuse (bsc#1101296)\n- scsi: target: fix crash with iscsi target and dvd (bsc#1099918)\n- scsi: zfcp: fix infinite iteration on ERP ready list (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bsc#1102088, LTC#169699)\n- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bsc#1102088, LTC#169699)\n- sctp: delay the authentication for the duplicated cookie-echo chunk (networking-stable-18_05_15)\n- sctp: do not check port in sctp_inet6_cmp_addr (networking-stable-18_04_26)\n- sctp: do not leak kernel memory to user space (networking-stable-18_04_10)\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (networking-stable-18_03_07)\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (networking-stable-18_05_15)\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (git-fixes)\n- sctp: not allow transport timeout value less than HZ/5 for hb_timer (networking-stable-18_06_08)\n- sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg (networking-stable-18_05_15)\n- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (networking-stable-18_04_10)\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (networking-stable-18_05_15)\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bsc#1051510)\n- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bsc#1051510)\n- selinux: skip bounded transition processing if the policy isn\u0027t loaded (bsc#1051510)\n- serdev: fix memleak on module unload (bsc#1051510)\n- serial: 8250: omap: Fix idling of clocks for unused uarts (bsc#1051510)\n- serial: altera: ensure port-\u003eregshift is honored consistently (bsc#1051510)\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bsc#1051510)\n- serial: earlycon: Only try fdt when specify \u0027earlycon\u0027 exactly (bsc#1051510)\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bsc#1051510)\n- serial: imx: Fix out-of-bounds access through serial port index (bsc#1051510)\n- serial: imx: drop if that always evaluates to true (bsc#1051510)\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bsc#1051510)\n- serial: pxa: Fix out-of-bounds access through serial port index (bsc#1051510)\n- serial: samsung: Fix out-of-bounds access through serial port index (bsc#1051510)\n- serial: samsung: fix maxburst parameter for DMA transactions (bsc#1051510)\n- serial: sh-sci: Fix out-of-bounds access through DT alias (bsc#1051510)\n- serial: sh-sci: Stop using printk format %pCr (bsc#1051510)\n- serial: sh-sci: Update warning message in sci_request_dma_chan() (bsc#1051510)\n- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bsc#1051510)\n- serial: sirf: Fix out-of-bounds access through DT alias (bsc#1051510)\n- serial: xuartps: Fix out-of-bounds access through DT alias (bsc#1051510)\n- series.conf: Sort scheduler stats optimisations\n- sfc: stop the TX queue before pushing new buffers (bsc#1058169)\n- skbuff: Fix not waking applications when errors are enqueued (networking-stable-18_03_28)\n- slip: Check if rstate is initialized before uncompressing (networking-stable-18_04_13)\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1051510)\n- smsc75xx: fix smsc75xx_set_features() (bsc#1051510)\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1051510)\n- soc/fsl/qbman: fix issue in qman_delete_cgr_safe() (networking-stable-18_03_28)\n- socket: close race condition between sock_close() and sockfs_setattr() (networking-stable-18_06_20)\n- soreuseport: fix mem leak in reuseport_add_sock() (networking-stable-18_02_06)\n- spi: bcm-qspi: fIX some error handling paths (bsc#1051510)\n- spi: core: Fix devm_spi_register_master() function name in kerneldoc (bsc#1051510)\n- spi: pxa2xx: Do not touch CS pin until we have a transfer pending (bsc#1051510)\n- spi: sh-msiof: Fix bit field overflow writes to TSCR/RSCR (bsc#1051510)\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bsc#1051510)\n- staging: fbtft: array underflow in fbtft_request_gpios_match() (bsc#1051510)\n- staging: iio: ade7759: fix signed extension bug on shift of a u8 (bsc#1051510)\n- staging: rtl8723bs: Prevent an underflow in rtw_check_beacon_data() (bsc#1051510)\n- staging: rtl8723bs: add missing range check on id (bsc#1051510)\n- staging: rtl8723bs: fix u8 less than zero check (bsc#1051510)\n- staging: rts5208: Fix \u0027seg_no\u0027 calculation in reset_ms_card() (bsc#1051510)\n- staging: sm750fb: Fix parameter mistake in poke32 (bsc#1051510)\n- staging:iio:ade7854: Fix error handling on read/write (bsc#1051510)\n- staging:iio:ade7854: Fix the wrong number of bits to read (bsc#1051510)\n- stm class: Fix a use-after-free (bsc#1051510)\n- stm class: Use vmalloc for the master map (bsc#1051510)\n- strparser: Do not call mod_delayed_work with a timeout of LONG_MAX (networking-stable-18_04_26)\n- strparser: Fix incorrect strp-\u003eneed_bytes value (networking-stable-18_04_26)\n- strparser: Fix sign of err codes (networking-stable-18_04_10)\n- sunrpc: remove incorrect HMAC request initialization (bsc#1051510)\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1051510)\n- tcp: do not read out-of-bounds opsize (networking-stable-18_04_26)\n- tcp: ignore Fast Open on repair mode (networking-stable-18_05_15)\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (networking-stable-18_04_26)\n- tcp: release sk_frag.page in tcp_disconnect (networking-stable-18_02_06)\n- tcp: revert F-RTO extension to detect more spurious timeouts (networking-stable-18_03_07)\n- tcp: verify the checksum of the first data segment in a new connection (networking-stable-18_06_20)\n- tcp_bbr: fix to zero idle_restart only upon S/ACKed data (networking-stable-18_05_15)\n- team: Fix double free in error path (networking-stable-18_03_28)\n- team: avoid adding twice the same option to the event list (networking-stable-18_04_26)\n- team: fix netconsole setup over team (networking-stable-18_04_26)\n- team: move dev_mc_sync after master_upper_dev_link in team_port_add (networking-stable-18_04_10)\n- team: use netdev_features_t instead of u32 (networking-stable-18_06_08)\n- tee: check shm references are consistent in offset/size (bsc#1051510)\n- tee: shm: fix use-after-free via temporarily dropped reference (bsc#1051510)\n- test_firmware: fix missing unlock on error in config_num_requests_store() (bsc#1051510)\n- test_firmware: fix setting old custom fw path back on exit (bsc#1051510)\n- test_firmware: fix setting old custom fw path back on exit, second try (bsc#1051510)\n- tg3: APE heartbeat changes (bsc#1086286)\n- tg3: Add Macronix NVRAM support (bsc#1086286)\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286)\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286)\n- tg3: prevent scheduling while atomic splat (bsc#1086286)\n- thermal/drivers/hisi: Fix kernel panic on alarm interrupt (bsc#1051510)\n- thermal/drivers/hisi: Fix missing interrupt enablement (bsc#1051510)\n- thermal/drivers/hisi: Fix multiple alarm interrupts firing (bsc#1051510)\n- thermal/drivers/hisi: Simplify the temperature/step computation (bsc#1051510)\n- thermal: bcm2835: Stop using printk format %pCr (bsc#1051510)\n- thermal: bcm2835: fix an error code in probe() (bsc#1051510)\n- thermal: exynos: Propagate error value from tmu_read() (bsc#1051510)\n- thermal: exynos: Reading temperature makes sense only when TMU is turned on (bsc#1051510)\n- thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bsc#1051510)\n- thermal: int3400_thermal: fix error handling in int3400_thermal_probe() (bsc#1051510)\n- thermal: int3403_thermal: Fix NULL pointer deref on module load / probe (bsc#1051510)\n- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bsc#1051510)\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#1099918)\n- timekeeping: Use proper timekeeper for debug code (bsc#1051510)\n- tipc: add policy for TIPC_NLA_NET_ADDR (networking-stable-18_04_26)\n- tipc: fix a memory leak in tipc_nl_node_get_link() (networking-stable-18_01_28)\n- tools lib traceevent: Fix get_field_str() for dynamic strings (bsc#1051510)\n- tools lib traceevent: Simplify pointer print logic and fix %pF (bsc#1051510)\n- tools/lib/lockdep: Define the ARRAY_SIZE() macro (bsc#1051510)\n- tools/lib/lockdep: Fix undefined symbol prandom_u32 (bsc#1051510)\n- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bsc#1051510)\n- tools/power turbostat: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1051510)\n- tools/thermal: tmon: fix for segfault (bsc#1051510)\n- tools/usbip: fixes build with musl libc toolchain (bsc#1051510)\n- tracing/uprobe_event: Fix strncpy corner case (bsc#1099918)\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bsc#1099918)\n- tracing: Fix missing tab for hwlat_detector print format (bsc#1099918)\n- tracing: Kconfig text fixes for CONFIG_HWLAT_TRACER (bsc#1099918)\n- tracing: Make the snapshot trigger work with instances (bsc#1099918)\n- tracing: probeevent: Fix to support minus offset from symbol (bsc#1099918)\n- tty/serial: atmel: use port-\u003ename as name in request_irq() (bsc#1051510)\n- tty: Avoid possible error pointer dereference at tty_ldisc_restore() (bsc#1051510)\n- tty: Do not call panic() at tty_ldisc_init() (bsc#1051510)\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bsc#1051510)\n- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bsc#1051510)\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug is not set (bsc#1051510)\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bsc#1051510)\n- tty: pl011: Avoid spuriously stuck-off interrupts (bsc#1051510)\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bsc#1051510)\n- ubifs: Fix data node size for truncating uncompressed nodes (bsc#1051510)\n- ubifs: Fix potential integer overflow in allocation (bsc#1051510)\n- ubifs: Fix uninitialized variable in search_dh_cookie() (bsc#1051510)\n- ubifs: Fix unlink code wrt. double hash lookups (bsc#1051510)\n- udp: fix rx queue len reported by diag and proc interface (networking-stable-18_06_20)\n- usb-storage: Add compatibility quirk flags for G-Technologies G-Drive (bsc#1051510)\n- usb-storage: Add support for FL_ALWAYS_SYNC flag in the UAS driver (bsc#1051510)\n- usb/gadget: Fix \u0027high bandwidth\u0027 check in usb_gadget_ep_match_desc() (bsc#1051510)\n- usb: Increment wakeup count on remote wakeup (bsc#1051510)\n- usb: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bsc#1087092)\n- usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1051510)\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bsc#1051510)\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bsc#1051510)\n- usb: cdc_acm: prevent race at write to acm while system resumes (bsc#1087092)\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1051510)\n- usb: do not reset if a low-speed or full-speed device timed out (bsc#1051510)\n- usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1051510)\n- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bsc#1051510)\n- usb: dwc2: Improve gadget state disconnection handling (bsc#1085539)\n- usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1051510)\n- usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1051510)\n- usb: dwc2: hcd: Fix host channel halt flow (bsc#1051510)\n- usb: dwc2: host: Fix transaction errors in host mode (bsc#1051510)\n- usb: dwc3: Add SoftReset PHY synchonization delay (bsc#1051510)\n- usb: dwc3: Fix GDBGFIFOSPACE_TYPE values (bsc#1051510)\n- usb: dwc3: Makefile: fix link error on randconfig (bsc#1051510)\n- usb: dwc3: Undo PHY init if soft reset fails (bsc#1051510)\n- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bsc#1051510)\n- usb: dwc3: ep0: Reset TRB counter for ep0 IN (bsc#1051510)\n- usb: dwc3: gadget: Fix list_del corruption in dwc3_ep_dequeue (bsc#1051510)\n- usb: dwc3: gadget: Set maxpacket size for ep0 IN (bsc#1051510)\n- usb: dwc3: of-simple: fix use-after-free on remove (bsc#1051510)\n- usb: dwc3: omap: do not miss events during suspend/resume (bsc#1051510)\n- usb: dwc3: pci: Properly cleanup resource (bsc#1051510)\n- usb: dwc3: prevent setting PRTCAP to OTG from debugfs (bsc#1051510)\n- usb: gadget: bdc: 64-bit pointer capability check (bsc#1051510)\n- usb: gadget: composite: fix incorrect handling of OS desc requests (bsc#1051510)\n- usb: gadget: core: Fix use-after-free of usb_request (bsc#1051510)\n- usb: gadget: dummy: fix nonsensical comparisons (bsc#1051510)\n- usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bsc#1051510)\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bsc#1051510)\n- usb: gadget: f_fs: Process all descriptors during bind (bsc#1051510)\n- usb: gadget: f_fs: Use config_ep_by_speed() (bsc#1051510)\n- usb: gadget: f_mass_storage: Fix the logic to iterate all common-\u003eluns (bsc#1051510)\n- usb: gadget: f_midi: fixing a possible double-free in f_midi (bsc#1051510)\n- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bsc#1051510)\n- usb: gadget: f_uac2: fix endianness of \u0027struct cntrl_*_lay3\u0027 (bsc#1051510)\n- usb: gadget: f_uac2: fix error handling in afunc_bind (again) (bsc#1051510)\n- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bsc#1051510)\n- usb: gadget: ffs: Let setup() return usb_GADGET_DELAYED_STATUS (bsc#1051510)\n- usb: gadget: fsl_udc_core: fix ep valid checks (bsc#1051510)\n- usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bsc#1051510)\n- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bsc#1051510)\n- usb: gadget: udc: core: update usb_ep_queue() documentation (bsc#1051510)\n- usb: gadget: udc: renesas_usb3: disable the controller\u0027s irqs for reconnecting (bsc#1051510)\n- usb: host: ehci: use correct device pointer for dma ops (bsc#1087092)\n- usb: host: xhci-plat: revert \u0027usb: host: xhci-plat: enable clk in resume timing\u0027 (bsc#1051510)\n- usb: ldusb: add PIDs for new CASSY devices supported by this driver (bsc#1051510)\n- usb: musb: Fix external abort in musb_remove on omap2430 (bsc#1051510)\n- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bsc#1051510)\n- usb: musb: fix enumeration after resume (bsc#1051510)\n- usb: musb: fix remote wakeup racing with suspend (bsc#1051510)\n- usb: musb: gadget: misplaced out of bounds check (bsc#1051510)\n- usb: musb: host: fix potential NULL pointer dereference (bsc#1051510)\n- usb: musb: trace: fix NULL pointer dereference in musb_g_tx() (bsc#1051510)\n- usb: option: Add support for FS040U modem (bsc#1087092)\n- usb: quirks: add delay quirks for Corsair Strafe (bsc#1051510)\n- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1051510)\n- usb: serial: cp210x: add CESINEL device ids (bsc#1051510)\n- usb: serial: cp210x: add ELDAT Easywave RX09 id (bsc#1051510)\n- usb: serial: cp210x: add ID for NI usb serial console (bsc#1051510)\n- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bsc#1051510)\n- usb: serial: cp210x: add another usb ID for Qivicon ZigBee stick (bsc#1051510)\n- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bsc#1051510)\n- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bsc#1051510)\n- usb: serial: ftdi_sio: use jtag quirk for Arrow usb Blaster (bsc#1051510)\n- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132)\n- usb: serial: mos7840: fix status-register error handling (bsc#1051510)\n- usb: serial: option: Add support for Quectel EP06 (bsc#1051510)\n- usb: serial: option: adding support for ublox R410M (bsc#1051510)\n- usb: serial: option: reimplement interface masking (bsc#1051510)\n- usb: serial: simple: add libtransistor console (bsc#1051510)\n- usb: serial: visor: handle potential invalid device configuration (bsc#1051510)\n- usb: typec: ucsi: Fix for incorrect status data issue (bsc#1100132)\n- usb: typec: ucsi: acpi: Workaround for cache mode issue (bsc#1100132)\n- usb: yurex: fix out-of-bounds uaccess in read handler (bsc#1100132)\n- usbip: Correct maximum value of CONFIG_usbIP_VHCI_HC_PORTS (bsc#1051510)\n- usbip: usbip_event: fix to not print kernel pointer address (bsc#1051510)\n- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bsc#1051510)\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bsc#1051510)\n- usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1051510)\n- userns: Do not fail follow_automount based on s_user_ns (bsc#1099918)\n- vfb: fix video mode and line_length being set when loaded (bsc#1100362)\n- vfio/pci: Fix potential Spectre v1 (bsc#1051510)\n- vfio/spapr: Use IOMMU pageshift rather than pagesize (bsc#1077761, git-fixes)\n- vfio: Use get_user_pages_longterm correctly (bsc#1095337)\n- vfio: platform: Fix reset module leak in error path (bsc#1099918)\n- vhost: Fix vhost_copy_to_user() (networking-stable-18_04_13)\n- vhost: correctly remove wait queue during poll failure (networking-stable-18_04_10)\n- vhost: fix vhost_vq_access_ok() log check (networking-stable-18_04_13)\n- vhost: synchronize IOTLB message with dev cleanup (networking-stable-18_06_08)\n- vhost: validate log when IOTLB is enabled (networking-stable-18_04_10)\n- vhost_net: add missing lock nesting notation (networking-stable-18_04_10)\n- vhost_net: stop device during reset owner (networking-stable-18_02_06)\n- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966)\n- video/omap: add module license tags (bsc#1090888)\n- video: remove unused kconfig SH_LCD_MIPI_DSI (bsc#1087092)\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bsc#1100382)\n- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bsc#1051510)\n- virtio-net: correctly transmit XDP buff after linearizing (networking-stable-18_06_08)\n- virtio-net: fix leaking page for gso packet during mergeable XDP (networking-stable-18_06_08)\n- virtio-net: fix module unloading (bsc#1051510)\n- virtio: add ability to iterate over vqs (bsc#1051510)\n- virtio_console: do not tie bufs to a vq (bsc#1051510)\n- virtio_console: drop custom control queue cleanup (bsc#1051510)\n- virtio_console: free buffers after reset (bsc#1051510)\n- virtio_console: move removal code (bsc#1051510)\n- virtio_console: reset on out of memory (bsc#1051510)\n- virtio_net: Disable interrupts if napi_complete_done rescheduled napi (bsc#1051510)\n- virtio_net: fix XDP code path in receive_small() (bsc#1051510)\n- virtio_net: fix adding vids on big-endian (networking-stable-18_04_26)\n- virtio_net: split out ctrl buffer (networking-stable-18_04_26)\n- virtio_ring: fix num_free handling in error case (bsc#1051510)\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (networking-stable-18_04_26)\n- vlan: also check phy_driver ts_info for vlan\u0027s real device (networking-stable-18_04_10)\n- vmcore: add API to collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584)\n- vmw_balloon: fix inflation with batching (bsc#1051510)\n- vmw_balloon: fixing double free when batching mode is off (bsc#1051510)\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860)\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860)\n- vmxnet3: increase default rx ring sizes (bsc#1091860)\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860)\n- vmxnet3: use DMA memory barriers where required (bsc#1091860)\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860)\n- vrf: Fix use after free and double free in vrf_finish_output (networking-stable-18_04_10)\n- vrf: check the original netdevice for generating redirect (networking-stable-18_06_08)\n- vt: prevent leaking uninitialized data to userspace via /dev/vcs* (bsc#1051510)\n- vti6: better validate user provided tunnel names (networking-stable-18_04_10)\n- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bsc#1051510)\n- wait: add wait_event_killable_timeout() (bsc#1099792)\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843)\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843)\n- watchdog: da9063: Fix updating timeout value (bsc#1100843)\n- watchdog: f71808e_wdt: Fix magic close handling (bsc#1051510)\n- watchdog: sp5100_tco: Fix watchdog disable bit (bsc#1051510)\n- wlcore: add missing nvs file name info for wilink8 (bsc#1051510)\n- x.509: unpack RSA signatureValue field from BIT STRING (bsc#1051510)\n- x86/efi: Access EFI MMIO data as unencrypted when SEV is active (bsc#1099193)\n- x86/pkeys: Add arch_pkeys_enabled() (, bsc#1078248)\n- x86/pkeys: Add arch_pkeys_enabled() (bsc#1078248)\n- x86/pkeys: Move vma_pkey() into asm/pkeys.h (, bsc#1078248)\n- x86/pkeys: Move vma_pkey() into asm/pkeys.h (bsc#1078248)\n- x86/stacktrace: Clarify the reliable success paths (bnc#1058115)\n- x86/stacktrace: Do not fail for ORC with regs on stack (bnc#1058115)\n- x86/stacktrace: Do not unwind after user regs (bnc#1058115)\n- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder (bnc#1058115)\n- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115)\n- x86/unwind/orc: Detect the end of the stack (bnc#1058115)\n- x86: Pass x86 as architecture on x86_64 and i386 (bsc#1093118)\n- xen/grant-table: log the lack of grants (bnc#1085042)\n- xhci: Add port status decoder for tracing purposes\n- xhci: Fix kernel oops in trace_xhci_free_virt_device (bsc#1100132)\n- xhci: Fix usb3 NULL pointer dereference at logical disconnect (bsc#1090888)\n- xhci: Fix use-after-free in xhci_free_virt_device (bsc#1100132)\n- xhci: Revert \u0027xhci: plat: Register shutdown for xhci_plat\u0027 (bsc#1090888)\n- xhci: add definitions for all port link states\n- xhci: add port speed ID to portsc tracing\n- xhci: add port status tracing\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132)\n- xprtrdma: Fix list corruption / DMAR errors during MR recovery (git-fixes)\n- xprtrdma: Return -ENOBUFS when no pages are available (git-fixes)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-15-2018-1505", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2222-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2222-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182222-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2222-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1037697", "url": "https://bugzilla.suse.com/1037697" }, { "category": "self", "summary": "SUSE Bug 1046299", "url": "https://bugzilla.suse.com/1046299" }, { "category": "self", "summary": "SUSE Bug 1046300", "url": "https://bugzilla.suse.com/1046300" }, { "category": "self", "summary": "SUSE Bug 1046302", "url": "https://bugzilla.suse.com/1046302" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1046307", "url": "https://bugzilla.suse.com/1046307" }, { "category": "self", "summary": "SUSE Bug 1046533", "url": "https://bugzilla.suse.com/1046533" }, { "category": "self", "summary": "SUSE Bug 1046543", "url": "https://bugzilla.suse.com/1046543" }, { "category": "self", "summary": "SUSE Bug 1048129", "url": "https://bugzilla.suse.com/1048129" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050529", "url": "https://bugzilla.suse.com/1050529" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050538", "url": "https://bugzilla.suse.com/1050538" }, { "category": "self", "summary": "SUSE Bug 1050540", "url": "https://bugzilla.suse.com/1050540" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054245", "url": "https://bugzilla.suse.com/1054245" }, { "category": "self", "summary": "SUSE Bug 1056651", "url": "https://bugzilla.suse.com/1056651" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1058169", "url": "https://bugzilla.suse.com/1058169" }, { "category": "self", "summary": "SUSE Bug 1058659", "url": "https://bugzilla.suse.com/1058659" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1066110", "url": "https://bugzilla.suse.com/1066110" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1075087", "url": "https://bugzilla.suse.com/1075087" }, { "category": "self", "summary": "SUSE Bug 1075360", "url": "https://bugzilla.suse.com/1075360" }, { "category": "self", "summary": "SUSE Bug 1075876", "url": "https://bugzilla.suse.com/1075876" }, { "category": "self", "summary": "SUSE Bug 1077338", "url": "https://bugzilla.suse.com/1077338" }, { "category": "self", "summary": "SUSE Bug 1077761", "url": "https://bugzilla.suse.com/1077761" }, { "category": "self", "summary": "SUSE Bug 1077989", "url": "https://bugzilla.suse.com/1077989" }, { "category": "self", "summary": "SUSE Bug 1078248", "url": "https://bugzilla.suse.com/1078248" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1085539", "url": "https://bugzilla.suse.com/1085539" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086283", "url": "https://bugzilla.suse.com/1086283" }, { "category": "self", "summary": "SUSE Bug 1086286", "url": "https://bugzilla.suse.com/1086286" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086319", "url": "https://bugzilla.suse.com/1086319" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1086324", "url": "https://bugzilla.suse.com/1086324" }, { "category": "self", "summary": "SUSE Bug 1086457", "url": "https://bugzilla.suse.com/1086457" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087202", "url": "https://bugzilla.suse.com/1087202" }, { "category": "self", "summary": "SUSE Bug 1087217", "url": "https://bugzilla.suse.com/1087217" }, { "category": "self", "summary": "SUSE Bug 1087233", "url": "https://bugzilla.suse.com/1087233" }, { "category": "self", "summary": "SUSE Bug 1087978", "url": "https://bugzilla.suse.com/1087978" }, { "category": "self", "summary": "SUSE Bug 1088821", "url": "https://bugzilla.suse.com/1088821" }, { "category": "self", "summary": "SUSE Bug 1088866", "url": "https://bugzilla.suse.com/1088866" }, { "category": "self", "summary": "SUSE Bug 1090098", "url": "https://bugzilla.suse.com/1090098" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1091424", "url": "https://bugzilla.suse.com/1091424" }, { "category": "self", "summary": "SUSE Bug 1091860", "url": "https://bugzilla.suse.com/1091860" }, { "category": "self", "summary": "SUSE Bug 1092472", "url": "https://bugzilla.suse.com/1092472" }, { "category": "self", "summary": "SUSE Bug 1093035", "url": "https://bugzilla.suse.com/1093035" }, { "category": "self", "summary": "SUSE Bug 1093118", "url": "https://bugzilla.suse.com/1093118" }, { "category": "self", "summary": "SUSE Bug 1093148", "url": "https://bugzilla.suse.com/1093148" }, { "category": "self", "summary": "SUSE Bug 1093290", "url": "https://bugzilla.suse.com/1093290" }, { "category": "self", "summary": "SUSE Bug 1093666", "url": "https://bugzilla.suse.com/1093666" }, { "category": "self", "summary": "SUSE Bug 1094119", "url": "https://bugzilla.suse.com/1094119" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094978", "url": "https://bugzilla.suse.com/1094978" }, { "category": "self", "summary": "SUSE Bug 1095155", "url": "https://bugzilla.suse.com/1095155" }, { "category": "self", "summary": "SUSE Bug 1095337", "url": "https://bugzilla.suse.com/1095337" }, { "category": "self", "summary": "SUSE Bug 1096330", "url": "https://bugzilla.suse.com/1096330" }, { "category": "self", "summary": "SUSE Bug 1096529", "url": "https://bugzilla.suse.com/1096529" }, { "category": "self", "summary": "SUSE Bug 1096790", "url": "https://bugzilla.suse.com/1096790" }, { "category": "self", "summary": "SUSE Bug 1096793", "url": "https://bugzilla.suse.com/1096793" }, { "category": "self", "summary": "SUSE Bug 1097034", "url": "https://bugzilla.suse.com/1097034" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1097941", "url": "https://bugzilla.suse.com/1097941" }, { "category": "self", "summary": "SUSE Bug 1097961", "url": "https://bugzilla.suse.com/1097961" }, { "category": "self", "summary": "SUSE Bug 1098050", "url": "https://bugzilla.suse.com/1098050" }, { "category": "self", "summary": "SUSE Bug 1098236", "url": "https://bugzilla.suse.com/1098236" }, { "category": "self", "summary": "SUSE Bug 1098401", "url": "https://bugzilla.suse.com/1098401" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1098626", "url": "https://bugzilla.suse.com/1098626" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1098706", "url": "https://bugzilla.suse.com/1098706" }, { "category": "self", "summary": "SUSE Bug 1098983", "url": "https://bugzilla.suse.com/1098983" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1099029", "url": "https://bugzilla.suse.com/1099029" }, { "category": "self", "summary": "SUSE Bug 1099041", "url": "https://bugzilla.suse.com/1099041" }, { "category": "self", "summary": "SUSE Bug 1099109", "url": "https://bugzilla.suse.com/1099109" }, { "category": "self", "summary": "SUSE Bug 1099142", "url": "https://bugzilla.suse.com/1099142" }, { "category": "self", "summary": "SUSE Bug 1099183", "url": "https://bugzilla.suse.com/1099183" }, { "category": "self", "summary": "SUSE Bug 1099193", "url": "https://bugzilla.suse.com/1099193" }, { "category": "self", "summary": "SUSE Bug 1099715", "url": "https://bugzilla.suse.com/1099715" }, { "category": "self", "summary": "SUSE Bug 1099792", "url": "https://bugzilla.suse.com/1099792" }, { "category": "self", "summary": "SUSE Bug 1099918", "url": "https://bugzilla.suse.com/1099918" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099966", "url": "https://bugzilla.suse.com/1099966" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100209", "url": "https://bugzilla.suse.com/1100209" }, { "category": "self", "summary": "SUSE Bug 1100340", "url": "https://bugzilla.suse.com/1100340" }, { "category": "self", "summary": "SUSE Bug 1100362", "url": "https://bugzilla.suse.com/1100362" }, { "category": "self", "summary": "SUSE Bug 1100382", "url": "https://bugzilla.suse.com/1100382" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1100491", "url": "https://bugzilla.suse.com/1100491" }, { "category": "self", "summary": "SUSE Bug 1100602", "url": "https://bugzilla.suse.com/1100602" }, { "category": "self", "summary": "SUSE Bug 1100633", "url": "https://bugzilla.suse.com/1100633" }, { "category": "self", "summary": "SUSE Bug 1100843", "url": "https://bugzilla.suse.com/1100843" }, { "category": "self", "summary": "SUSE Bug 1100884", "url": "https://bugzilla.suse.com/1100884" }, { "category": "self", "summary": "SUSE Bug 1101143", "url": "https://bugzilla.suse.com/1101143" }, { "category": "self", "summary": "SUSE Bug 1101296", "url": "https://bugzilla.suse.com/1101296" }, { "category": "self", "summary": "SUSE Bug 1101315", "url": "https://bugzilla.suse.com/1101315" }, { "category": "self", "summary": "SUSE Bug 1101324", "url": "https://bugzilla.suse.com/1101324" }, { "category": "self", "summary": "SUSE Bug 1101337", "url": "https://bugzilla.suse.com/1101337" }, { "category": "self", "summary": "SUSE Bug 1101352", "url": "https://bugzilla.suse.com/1101352" }, { "category": "self", "summary": "SUSE Bug 1101564", "url": "https://bugzilla.suse.com/1101564" }, { "category": "self", "summary": "SUSE Bug 1101669", "url": "https://bugzilla.suse.com/1101669" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1101813", "url": "https://bugzilla.suse.com/1101813" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1102088", "url": "https://bugzilla.suse.com/1102088" }, { "category": "self", "summary": "SUSE Bug 1102097", "url": "https://bugzilla.suse.com/1102097" }, { "category": "self", "summary": "SUSE Bug 1102147", "url": "https://bugzilla.suse.com/1102147" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102512", "url": "https://bugzilla.suse.com/1102512" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103216", "url": "https://bugzilla.suse.com/1103216" }, { "category": "self", "summary": "SUSE Bug 1103220", "url": "https://bugzilla.suse.com/1103220" }, { "category": "self", "summary": "SUSE Bug 1103230", "url": "https://bugzilla.suse.com/1103230" }, { "category": "self", "summary": "SUSE Bug 1103421", "url": "https://bugzilla.suse.com/1103421" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9385 page", "url": "https://www.suse.com/security/cve/CVE-2018-9385/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-06T17:26:20Z", "generator": { "date": "2018-08-06T17:26:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2222-1", "initial_release_date": "2018-08-06T17:26:20Z", "revision_history": [ { "date": "2018-08-06T17:26:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.8.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.8.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.8.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.8.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.8.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.8.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-azure-4.12.14-5.8.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.8.1.x86_64", "product_id": "kernel-azure-4.12.14-5.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.8.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.8.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.8.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.8.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.8.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.8.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.8.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.8.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.8.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.8.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.8.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.8.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9385" } ], "notes": [ { "category": "general", "text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9385", "url": "https://www.suse.com/security/cve/CVE-2018-9385" }, { "category": "external", "summary": "SUSE Bug 1100491 for CVE-2018-9385", "url": "https://bugzilla.suse.com/1100491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.8.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.8.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-06T17:26:20Z", "details": "moderate" } ], "title": "CVE-2018-9385" } ] }
suse-su-2019:0955-1
Vulnerability from csaf_suse
Published
2019-04-16 11:06
Modified
2019-04-16 11:06
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_104 fixes one issue.
The following security issue was fixed:
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-2019-955,SUSE-SLE-SAP-12-SP2-2019-955,SUSE-SLE-SERVER-12-SP2-2019-955
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_104 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-955,SUSE-SLE-SAP-12-SP2-2019-955,SUSE-SLE-SERVER-12-SP2-2019-955", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0955-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0955-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190955-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0955-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005341.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP2)", "tracking": { "current_release_date": "2019-04-16T11:06:42Z", "generator": { "date": "2019-04-16T11:06:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0955-1", "initial_release_date": "2019-04-16T11:06:42Z", "revision_history": [ { "date": "2019-04-16T11:06:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-16T11:06:42Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2019:14127-1
Vulnerability from csaf_suse
Published
2019-07-18 15:53
Modified
2019-07-18 15:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel(bnc#1120758).
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before (bnc#1120758).
- CVE-2019-3896: A double-free could happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker could use this flaw for a privilege escalation or for a system crash and a denial of service (DoS) (bnc#1138943).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could lead to a denial of service (bnc#1102340).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424 1136446).
The following non-security bugs were fixed:
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- fnic: Fix to cleanup aborted IO to avoid device being offlined by mid-layer (bsc#1134835).
- signal: give SEND_SIG_FORCED more power to beat SIGNAL_UNKILLABLE (bsc#1135650).
- signal: oom_kill_task: use SEND_SIG_FORCED instead of force_sig() (bsc#1135650).
- tcp: a regression in the previous fix for the TCP SACK issue was fixed (bnc#1139751)
Patchnames
slessp4-kernel-source-14127,slexsp3-kernel-source-14127
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel(bnc#1120758).\n- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before (bnc#1120758).\n- CVE-2019-3896: A double-free could happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker could use this flaw for a privilege escalation or for a system crash and a denial of service (DoS) (bnc#1138943).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could lead to a denial of service (bnc#1102340).\n- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424 1136446).\n\nThe following non-security bugs were fixed:\n\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- fnic: Fix to cleanup aborted IO to avoid device being offlined by mid-layer (bsc#1134835).\n- signal: give SEND_SIG_FORCED more power to beat SIGNAL_UNKILLABLE (bsc#1135650).\n- signal: oom_kill_task: use SEND_SIG_FORCED instead of force_sig() (bsc#1135650).\n- tcp: a regression in the previous fix for the TCP SACK issue was fixed (bnc#1139751)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-source-14127,slexsp3-kernel-source-14127", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14127-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:14127-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914127-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:14127-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1090078", "url": "https://bugzilla.suse.com/1090078" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134835", "url": "https://bugzilla.suse.com/1134835" }, { "category": "self", "summary": "SUSE Bug 1135650", "url": "https://bugzilla.suse.com/1135650" }, { "category": "self", "summary": "SUSE Bug 1136424", "url": "https://bugzilla.suse.com/1136424" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1138943", "url": "https://bugzilla.suse.com/1138943" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3896 page", "url": "https://www.suse.com/security/cve/CVE-2019-3896/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-18T15:53:32Z", "generator": { "date": "2019-07-18T15:53:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:14127-1", "initial_release_date": "2019-07-18T15:53:32Z", "revision_history": [ { "date": "2019-07-18T15:53:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.i586", "product": { "name": "kernel-default-3.0.101-108.98.1.i586", "product_id": "kernel-default-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.98.1.i586", "product_id": "kernel-default-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.i586", "product_id": "kernel-default-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.98.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.98.1.i586", "product_id": "kernel-ec2-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.98.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.98.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.98.1.i586", "product": { "name": "kernel-pae-3.0.101-108.98.1.i586", "product_id": "kernel-pae-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.98.1.i586", "product_id": "kernel-pae-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.98.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.i586", "product": { "name": "kernel-source-3.0.101-108.98.1.i586", "product_id": "kernel-source-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.i586", "product": { "name": "kernel-syms-3.0.101-108.98.1.i586", "product_id": "kernel-syms-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.i586", "product": { "name": "kernel-trace-3.0.101-108.98.1.i586", "product_id": "kernel-trace-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.i586", "product_id": "kernel-trace-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.98.1.i586", "product": { "name": "kernel-xen-3.0.101-108.98.1.i586", "product_id": "kernel-xen-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.98.1.i586", "product_id": "kernel-xen-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.98.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.98.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.98.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.98.1.ppc64", "product_id": "kernel-default-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.98.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.98.1.ppc64", "product_id": "kernel-source-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.98.1.ppc64", "product_id": "kernel-syms-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.98.1.ppc64", "product_id": "kernel-trace-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.98.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-3.0.101-108.98.1.s390x", "product_id": "kernel-default-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.98.1.s390x", "product_id": "kernel-default-base-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.98.1.s390x", "product_id": "kernel-default-man-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.s390x", "product": { "name": "kernel-source-3.0.101-108.98.1.s390x", "product_id": "kernel-source-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.98.1.s390x", "product_id": "kernel-syms-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.98.1.s390x", "product_id": "kernel-trace-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.98.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.98.1.x86_64", "product_id": "kernel-default-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.98.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.98.1.x86_64", "product_id": "kernel-source-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.98.1.x86_64", "product_id": "kernel-syms-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.98.1.x86_64", "product_id": "kernel-trace-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.98.1.x86_64", "product_id": "kernel-xen-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.98.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586" }, "product_reference": "kernel-default-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586" }, "product_reference": "kernel-source-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3896" } ], "notes": [ { "category": "general", "text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3896", "url": "https://www.suse.com/security/cve/CVE-2019-3896" }, { "category": "external", "summary": "SUSE Bug 1138943 for CVE-2019-3896", "url": "https://bugzilla.suse.com/1138943" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2019-3896", "url": "https://bugzilla.suse.com/1156434" }, { "category": "external", "summary": "SUSE Bug 1173987 for CVE-2019-3896", "url": "https://bugzilla.suse.com/1173987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3896" } ] }
suse-su-2018:3470-1
Vulnerability from csaf_suse
Published
2018-10-25 18:09
Modified
2018-10-25 18:09
Summary
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_95 fixes several issues.
The following security issues were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-2483,SUSE-SLE-SERVER-12-SP2-2018-2483
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_95 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-2483,SUSE-SLE-SERVER-12-SP2-2018-2483", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3470-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3470-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183470-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3470-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-10-25T18:09:54Z", "generator": { "date": "2018-10-25T18:09:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3470-1", "initial_release_date": "2018-10-25T18:09:54Z", "revision_history": [ { "date": "2018-10-25T18:09:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-25T18:09:54Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-25T18:09:54Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:3328-1
Vulnerability from csaf_suse
Published
2018-10-23 10:46
Modified
2018-10-23 10:46
Summary
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_107 fixes several issues.
The following security issues were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-SLE-SERVER-12-SP1-2018-2394
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_107 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP1-2018-2394", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3328-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3328-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183328-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3328-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-10-23T10:46:28Z", "generator": { "date": "2018-10-23T10:46:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3328-1", "initial_release_date": "2018-10-23T10:46:28Z", "revision_history": [ { "date": "2018-10-23T10:46:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T10:46:28Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-23T10:46:28Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:3172-1
Vulnerability from csaf_suse
Published
2018-10-16 16:31
Modified
2018-10-16 16:31
Summary
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_104 fixes several issues.
The following security issues were fixed:
- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-SLE-SERVER-12-SP1-2018-2274
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_104 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP1-2018-2274", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3172-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3172-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183172-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3172-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE Bug 1110233", "url": "https://bugzilla.suse.com/1110233" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17182 page", "url": "https://www.suse.com/security/cve/CVE-2018-17182/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-10-16T16:31:26Z", "generator": { "date": "2018-10-16T16:31:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3172-1", "initial_release_date": "2018-10-16T16:31:26Z", "revision_history": [ { "date": "2018-10-16T16:31:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-16T16:31:26Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-17182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17182" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17182", "url": "https://www.suse.com/security/cve/CVE-2018-17182" }, { "category": "external", "summary": "SUSE Bug 1108399 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1108399" }, { "category": "external", "summary": "SUSE Bug 1110233 for CVE-2018-17182", "url": "https://bugzilla.suse.com/1110233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-16T16:31:26Z", "details": "moderate" } ], "title": "CVE-2018-17182" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-16T16:31:26Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:3789-1
Vulnerability from csaf_suse
Published
2018-11-16 14:56
Modified
2018-11-16 14:56
Summary
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_98 fixes several issues.
The following security issues were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bsc#1107832).
- CVE-2018-5390: Fixed the possiblilty that the kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102682).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-2688,SUSE-SLE-SERVER-12-SP2-2018-2688
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_98 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bsc#1107832).\n- CVE-2018-5390: Fixed the possiblilty that the kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-2688,SUSE-SLE-SERVER-12-SP2-2018-2688", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3789-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3789-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183789-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3789-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-11-16T14:56:04Z", "generator": { "date": "2018-11-16T14:56:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3789-1", "initial_release_date": "2018-11-16T14:56:04Z", "revision_history": [ { "date": "2018-11-16T14:56:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-16T14:56:04Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-11-16T14:56:04Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2344-1
Vulnerability from csaf_suse
Published
2018-08-16 07:06
Modified
2018-08-16 07:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
The following non-security bugs were fixed:
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand->siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
Patchnames
SUSE-OpenStack-Cloud-7-2018-1603,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1603,SUSE-SLE-HA-12-SP2-2018-1603,SUSE-SLE-SAP-12-SP2-2018-1603,SUSE-SLE-SERVER-12-SP2-2018-1603,SUSE-Storage-4-2018-1603
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).\n- CVE-2018-9385: When printing the \u0027driver_override\u0027 option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n\nThe following non-security bugs were fixed:\n\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: do not attach backing with duplicate UUID (bsc#1076110).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix for allocator and register thread race (bsc#1076110).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: return attach error when no cache set exist (bsc#1076110).\n- bcache: segregate flash only volume write streams (bsc#1076110).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).\n- ixgbe: fix possible race in reset subtask (bsc#1101557).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).\n- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (bsc#1096130).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-1603,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1603,SUSE-SLE-HA-12-SP2-2018-1603,SUSE-SLE-SAP-12-SP2-2018-1603,SUSE-SLE-SERVER-12-SP2-2018-1603,SUSE-Storage-4-2018-1603", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2344-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2344-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2344-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1094248", "url": "https://bugzilla.suse.com/1094248" }, { "category": "self", "summary": "SUSE Bug 1096130", "url": "https://bugzilla.suse.com/1096130" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097140", "url": "https://bugzilla.suse.com/1097140" }, { "category": "self", "summary": "SUSE Bug 1097551", "url": "https://bugzilla.suse.com/1097551" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098435", "url": "https://bugzilla.suse.com/1098435" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1100491", "url": "https://bugzilla.suse.com/1100491" }, { "category": "self", "summary": "SUSE Bug 1101557", "url": "https://bugzilla.suse.com/1101557" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9385 page", "url": "https://www.suse.com/security/cve/CVE-2018-9385/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T07:06:02Z", "generator": { "date": "2018-08-16T07:06:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2344-1", "initial_release_date": "2018-08-16T07:06:02Z", "revision_history": [ { "date": "2018-08-16T07:06:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.92.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.92.1.noarch", "product_id": "kernel-devel-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.92.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.92.1.noarch", "product_id": "kernel-macros-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.92.1.noarch", "product": { "name": "kernel-source-4.4.121-92.92.1.noarch", "product_id": "kernel-source-4.4.121-92.92.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.92.1.ppc64le", "product_id": "kernel-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.92.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.92.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.92.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-4.4.121-92.92.1.s390x", "product_id": "kernel-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.92.1.s390x", "product_id": "kernel-default-base-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.92.1.s390x", "product_id": "kernel-default-man-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.92.1.s390x", "product_id": "kernel-syms-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.92.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.92.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.92.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product_id": "kernel-syms-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product": { "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product_id": "lttng-modules-2.7.1-9.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9385" } ], "notes": [ { "category": "general", "text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9385", "url": "https://www.suse.com/security/cve/CVE-2018-9385" }, { "category": "external", "summary": "SUSE Bug 1100491 for CVE-2018-9385", "url": "https://bugzilla.suse.com/1100491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-9385" } ] }
suse-su-2018:2860-1
Vulnerability from csaf_suse
Published
2018-09-25 15:52
Modified
2018-09-25 15:52
Summary
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-2011,SUSE-SLE-SAP-12-SP2-2018-2012,SUSE-SLE-SAP-12-SP2-2018-2013,SUSE-SLE-SAP-12-SP2-2018-2014,SUSE-SLE-SAP-12-SP2-2018-2015,SUSE-SLE-SAP-12-SP2-2018-2016,SUSE-SLE-SAP-12-SP2-2018-2017,SUSE-SLE-SERVER-12-SP2-2018-2011,SUSE-SLE-SERVER-12-SP2-2018-2012,SUSE-SLE-SERVER-12-SP2-2018-2013,SUSE-SLE-SERVER-12-SP2-2018-2014,SUSE-SLE-SERVER-12-SP2-2018-2015,SUSE-SLE-SERVER-12-SP2-2018-2016,SUSE-SLE-SERVER-12-SP2-2018-2017
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_64 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-2011,SUSE-SLE-SAP-12-SP2-2018-2012,SUSE-SLE-SAP-12-SP2-2018-2013,SUSE-SLE-SAP-12-SP2-2018-2014,SUSE-SLE-SAP-12-SP2-2018-2015,SUSE-SLE-SAP-12-SP2-2018-2016,SUSE-SLE-SAP-12-SP2-2018-2017,SUSE-SLE-SERVER-12-SP2-2018-2011,SUSE-SLE-SERVER-12-SP2-2018-2012,SUSE-SLE-SERVER-12-SP2-2018-2013,SUSE-SLE-SERVER-12-SP2-2018-2014,SUSE-SLE-SERVER-12-SP2-2018-2015,SUSE-SLE-SERVER-12-SP2-2018-2016,SUSE-SLE-SERVER-12-SP2-2018-2017", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2860-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2860-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182860-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2860-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" }, { "category": "self", "summary": "SUSE Bug 1096723", "url": "https://bugzilla.suse.com/1096723" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000026 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000026/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-09-25T15:52:28Z", "generator": { "date": "2018-09-25T15:52:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2860-1", "initial_release_date": "2018-09-25T15:52:28Z", "revision_history": [ { "date": "2018-09-25T15:52:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000026" } ], "notes": [ { "category": "general", "text": "Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000026", "url": "https://www.suse.com/security/cve/CVE-2018-1000026" }, { "category": "external", "summary": "SUSE Bug 1079384 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1079384" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096723 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1096723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:52:28Z", "details": "important" } ], "title": "CVE-2018-1000026" }, { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:52:28Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:52:28Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:52:28Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2019:1767-1
Vulnerability from csaf_suse
Published
2019-07-08 12:32
Modified
2019-07-08 12:32
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_114 fixes several issues.
The following security issues were fixed:
- CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).
- CVE-2018-5390: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-2019-1767,SUSE-SLE-SAP-12-SP1-2019-1767,SUSE-SLE-SAP-12-SP2-2019-1766,SUSE-SLE-SERVER-12-SP1-2019-1767,SUSE-SLE-SERVER-12-SP2-2019-1766
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_114 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).\n- CVE-2018-5390: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1767,SUSE-SLE-SAP-12-SP1-2019-1767,SUSE-SLE-SAP-12-SP2-2019-1766,SUSE-SLE-SERVER-12-SP1-2019-1767,SUSE-SLE-SERVER-12-SP2-2019-1766", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1767-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1767-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191767-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1767-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1133191", "url": "https://bugzilla.suse.com/1133191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11487 page", "url": "https://www.suse.com/security/cve/CVE-2019-11487/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP2)", "tracking": { "current_release_date": "2019-07-08T12:32:02Z", "generator": { "date": "2019-07-08T12:32:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1767-1", "initial_release_date": "2019-07-08T12:32:02Z", "revision_history": [ { "date": "2019-07-08T12:32:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-08T12:32:02Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2019-11487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11487" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11487", "url": "https://www.suse.com/security/cve/CVE-2019-11487" }, { "category": "external", "summary": "SUSE Bug 1133190 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133190" }, { "category": "external", "summary": "SUSE Bug 1133191 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-08T12:32:02Z", "details": "moderate" } ], "title": "CVE-2019-11487" } ] }
suse-su-2019:2230-1
Vulnerability from csaf_suse
Published
2019-08-28 05:58
Modified
2019-08-28 05:58
Summary
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_117 fixes one issue.
The following security issue was fixed:
- CVE-2018-5390: Fixed expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682).
Patchnames
SUSE-2019-2230,SUSE-SLE-SAP-12-SP2-2019-2230,SUSE-SLE-SERVER-12-SP2-2019-2230
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_117 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-5390: Fixed expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2230,SUSE-SLE-SAP-12-SP2-2019-2230,SUSE-SLE-SERVER-12-SP2-2019-2230", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2230-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2230-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192230-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2230-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005845.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP2)", "tracking": { "current_release_date": "2019-08-28T05:58:51Z", "generator": { "date": "2019-08-28T05:58:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2230-1", "initial_release_date": "2019-08-28T05:58:51Z", "revision_history": [ { "date": "2019-08-28T05:58:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_117-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T05:58:51Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2019:2821-1
Vulnerability from csaf_suse
Published
2019-10-30 10:32
Modified
2019-10-30 10:32
Summary
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_110 fixes several issues.
The following security issues were fixed:
- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).
- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).
Patchnames
SUSE-2019-2821,SUSE-SLE-SAP-12-SP1-2019-2821,SUSE-SLE-SERVER-12-SP1-2019-2821
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_110 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).\n- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2821,SUSE-SLE-SAP-12-SP1-2019-2821,SUSE-SLE-SERVER-12-SP1-2019-2821", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2821-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2821-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192821-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2821-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1133191", "url": "https://bugzilla.suse.com/1133191" }, { "category": "self", "summary": "SUSE Bug 1136446", "url": "https://bugzilla.suse.com/1136446" }, { "category": "self", "summary": "SUSE Bug 1137597", "url": "https://bugzilla.suse.com/1137597" }, { "category": "self", "summary": "SUSE Bug 1140747", "url": "https://bugzilla.suse.com/1140747" }, { "category": "self", "summary": "SUSE Bug 1144903", "url": "https://bugzilla.suse.com/1144903" }, { "category": "self", "summary": "SUSE Bug 1151021", "url": "https://bugzilla.suse.com/1151021" }, { "category": "self", "summary": "SUSE Bug 1153108", "url": "https://bugzilla.suse.com/1153108" }, { "category": "self", "summary": "SUSE Bug 1153158", "url": "https://bugzilla.suse.com/1153158" }, { "category": "self", "summary": "SUSE Bug 1153161", "url": "https://bugzilla.suse.com/1153161" }, { "category": "self", "summary": "SUSE Bug 904970", "url": "https://bugzilla.suse.com/904970" }, { "category": "self", "summary": "SUSE Bug 907150", "url": "https://bugzilla.suse.com/907150" }, { "category": "self", "summary": "SUSE Bug 920615", "url": "https://bugzilla.suse.com/920615" }, { "category": "self", "summary": "SUSE Bug 920633", "url": "https://bugzilla.suse.com/920633" }, { "category": "self", "summary": "SUSE Bug 930408", "url": "https://bugzilla.suse.com/930408" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10220 page", "url": "https://www.suse.com/security/cve/CVE-2019-10220/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11487 page", "url": "https://www.suse.com/security/cve/CVE-2019-11487/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14835 page", "url": "https://www.suse.com/security/cve/CVE-2019-14835/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)", "tracking": { "current_release_date": "2019-10-30T10:32:41Z", "generator": { "date": "2019-10-30T10:32:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2821-1", "initial_release_date": "2019-10-30T10:32:41Z", "revision_history": [ { "date": "2019-10-30T10:32:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2019-10220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10220" } ], "notes": [ { "category": "general", "text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10220", "url": "https://www.suse.com/security/cve/CVE-2019-10220" }, { "category": "external", "summary": "SUSE Bug 1144903 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1144903" }, { "category": "external", "summary": "SUSE Bug 1153108 for CVE-2019-10220", "url": "https://bugzilla.suse.com/1153108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "moderate" } ], "title": "CVE-2019-10220" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11487" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11487", "url": "https://www.suse.com/security/cve/CVE-2019-11487" }, { "category": "external", "summary": "SUSE Bug 1133190 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133190" }, { "category": "external", "summary": "SUSE Bug 1133191 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "moderate" } ], "title": "CVE-2019-11487" }, { "cve": "CVE-2019-14835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14835" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14835", "url": "https://www.suse.com/security/cve/CVE-2019-14835" }, { "category": "external", "summary": "SUSE Bug 1150112 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1150112" }, { "category": "external", "summary": "SUSE Bug 1151021 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1151021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "moderate" } ], "title": "CVE-2019-14835" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-30T10:32:41Z", "details": "moderate" } ], "title": "CVE-2019-3846" } ] }
suse-su-2018:2596-1
Vulnerability from csaf_suse
Published
2018-09-03 15:29
Modified
2018-09-03 15:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.147 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bsc#1103580).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free was possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem was vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user could cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user could cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following non-security bugs were fixed:
- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- alsa: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- alsa: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- alsa: fm801: add error handling for snd_ctl_add (bnc#1012382).
- alsa: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- alsa: rawmidi: Change resized buffers atomically (bnc#1012382).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- arc: Fix CONFIG_SWAP (bnc#1012382).
- arc: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- arm: fix put_user() for gcc-8 (bnc#1012382).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- asoc: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- audit: allow not equal op for audit by executable (bnc#1012382).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blkcg: simplify statistic accumulation code (bsc#1082979).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: do not use interruptible wait anywhere (bnc#1012382).
- block/swim: Fix array bounds check (bsc#1082979).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (git-fixes).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).
- documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- drbd: fix access after free (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: re-enable error handling (bsc#1103884).
- esp6: fix memleak on error path in esp6_input (git-fixes).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- genirq: Make force irq threading setup more robust (bsc#1082979).
- hid: debug: check length before copy_to_user() (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- hid: i2c-hid: check if device is there before really probing (bnc#1012382).
- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- ib/isert: fix T10-pi check mask setting (bsc#1082979).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- KEYS: DNS: fix parsing multiple options (bnc#1012382).
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).
- libata: Fix command retry decision (bnc#1012382).
- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init() (git-fixes).
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- null_blk: use sector_div instead of do_div (bsc#1082979).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- pci: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- pci: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- rdma/mad: Convert BUG_ONs to error flows (bnc#1012382).
- rdma/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).
- rdma/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- Remove broken patches for dac9063 watchdog (bsc#1100843)
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717)
- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).
- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sg: fix minor memory leak in error path (bsc#1082979).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).
- scsi: ufs: fix exception event handling (bnc#1012382).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- USB: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).
- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- USB: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- USB: serial: mos7840: fix status-register error handling (bnc#1012382).
- USB: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: preserve numbers (kabi).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl (git-fixes).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-RT-12-SP3-2018-1827
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.147 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bsc#1103580).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free was possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem was vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user could cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user could cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).\n\nThe following non-security bugs were fixed:\n\n- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- alsa: emu10k1: add error handling for snd_ctl_add (bnc#1012382).\n- alsa: emu10k1: Rate-limit error messages about page errors (bnc#1012382).\n- alsa: fm801: add error handling for snd_ctl_add (bnc#1012382).\n- alsa: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).\n- alsa: rawmidi: Change resized buffers atomically (bnc#1012382).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).\n- arc: Fix CONFIG_SWAP (bnc#1012382).\n- arc: mm: allow mprotect to make stack mappings executable (bnc#1012382).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).\n- arm: fix put_user() for gcc-8 (bnc#1012382).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).\n- asoc: pxa: Fix module autoload for platform drivers (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).\n- ath: Add regulatory mapping for Bahamas (bnc#1012382).\n- ath: Add regulatory mapping for Bermuda (bnc#1012382).\n- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).\n- ath: Add regulatory mapping for Serbia (bnc#1012382).\n- ath: Add regulatory mapping for Tanzania (bnc#1012382).\n- ath: Add regulatory mapping for Uganda (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- audit: allow not equal op for audit by executable (bnc#1012382).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blkcg: simplify statistic accumulation code (bsc#1082979).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: do not use interruptible wait anywhere (bnc#1012382).\n- block/swim: Fix array bounds check (bsc#1082979).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).\n- bluetooth: hci_qca: Fix \u0027Sleep inside atomic section\u0027 warning (bnc#1012382).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (git-fixes).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).\n- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cifs: Fix infinite loop when using hard mount option (bnc#1012382).\n- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override \u0027inline\u0027 for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).\n- disable loading f2fs module on PAGE_SIZE \u003e 4KB (bnc#1012382).\n- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).\n- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).\n- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).\n- documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).\n- drbd: fix access after free (bnc#1012382).\n- driver core: Partially revert \u0027driver core: correct device\u0027s shutdown order\u0027 (bnc#1012382).\n- drm: Add DP PSR2 sink enable bit (bnc#1012382).\n- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/gma500: fix psb_intel_lvds_mode_valid()\u0027s return type (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm/radeon: fix mode_valid\u0027s return type (bnc#1012382).\n- drm: re-enable error handling (bsc#1103884).\n- esp6: fix memleak on error path in esp6_input (git-fixes).\n- ext4: add more inode number paranoia checks (bnc#1012382).\n- ext4: add more mount time checks of the superblock (bnc#1012382).\n- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: check superblock mapped prior to committing (bnc#1012382).\n- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).\n- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).\n- ext4: only look at the bg_flags field if it is valid (bnc#1012382).\n- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).\n- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).\n- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- genirq: Make force irq threading setup more robust (bsc#1082979).\n- hid: debug: check length before copy_to_user() (bnc#1012382).\n- hid: hiddev: fix potential Spectre v1 (bnc#1012382).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).\n- hid: i2c-hid: check if device is there before really probing (bnc#1012382).\n- hid: i2c-hid: Fix \u0027incomplete report\u0027 noise (bnc#1012382).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).\n- i2c: imx: Fix reinit_completion() use (bnc#1012382).\n- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).\n- ib/isert: fix T10-pi check mask setting (bsc#1082979).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).\n- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).\n- ip: hash fragments consistently (bnc#1012382).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).\n- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).\n- ipv6: fix useless rol32 call on hash (bnc#1012382).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).\n- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).\n- kabi protect includes in include/linux/inet.h (bsc#1095643).\n- KABI protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 since no one uses symboles expoted by bcache.\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- KEYS: DNS: fix parsing multiple options (bnc#1012382).\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1102214).\n- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).\n- kvm: x86: vmx: fix vpid leak (bnc#1012382).\n- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).\n- libata: Fix command retry decision (bnc#1012382).\n- lib/rhashtable: consider param-\u003emin_size when setting initial table size (bnc#1012382).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- md: fix NULL dereference of mddev-\u003epers in remove_and_add_spares() (bnc#1012382).\n- media: cx25840: Use subdev host data for PLL override (bnc#1012382).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).\n- media: saa7164: Fix driver name in debug output (bnc#1012382).\n- media: si470x: fix __be16 annotations (bnc#1012382).\n- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).\n- media: videobuf2-core: do not call memop \u0027finish\u0027 when queueing (bnc#1012382).\n- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).\n- memory: tegra: Do not handle spurious interrupts (bnc#1012382).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).\n- microblaze: Fix simpleImage format generation (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- mm: hugetlb: yield when prepping struct pages (bnc#1012382).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).\n- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).\n- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).\n- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).\n- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init() (git-fixes).\n- mwifiex: correct histogram data with appropriate index (bnc#1012382).\n- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).\n- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: ipset: List timing out entries with \u0027timeout 1\u0027 instead of zero (bnc#1012382).\n- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).\n- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net: fix amd-xgbe flow-control issue (bnc#1012382).\n- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).\n- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).\n- netlink: Do not shift on 64 for ngroups (bnc#1012382).\n- netlink: Do not shift with UB on nlk-\u003engroups (bnc#1012382).\n- netlink: Do not subscribe to non-existent groups (bnc#1012382).\n- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).\n- net: stmmac: align DMA stuff to largest cache line length (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).\n- nohz: Fix local_timer_softirq_pending() (bnc#1012382).\n- n_tty: Access echo_* variables carefully (bnc#1012382).\n- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).\n- null_blk: use sector_div instead of do_div (bsc#1082979).\n- nvme-pci: initialize queue memory before interrupts (bnc#1012382).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item-\u003eci_parent (bnc#1012382).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- pci: pciehp: Request control of native hotplug only if supported (bnc#1012382).\n- pci: Prevent sysfs disable of device while driver is attached (bnc#1012382).\n- perf: fix invalid bit in diagnostic entry (bnc#1012382).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).\n- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).\n- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/32: Add a missing include header (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).\n- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).\n- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).\n- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).\n- powerpc/powermac: Mark variable x as unused (bnc#1012382).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- ptp: fix missing break in switch (bnc#1012382).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- random: mix rdrand with entropy sent in from userspace (bnc#1012382).\n- rdma/mad: Convert BUG_ONs to error flows (bnc#1012382).\n- rdma/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).\n- rdma/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).\n- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).\n- Remove broken patches for dac9063 watchdog (bsc#1100843)\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- Revert \u0027block-cancel-workqueue-entries-on-blk_mq_freeze_queue\u0027 (bsc#1103717)\n- Revert \u0027net: Do not copy pfmemalloc flag in __copy_skb_header()\u0027 (kabi).\n- Revert \u0027sit: reload iphdr in ipip6_rcv\u0027 (bnc#1012382).\n- Revert \u0027skbuff: Unconditionally copy pfmemalloc in __skb_clone()\u0027 (kabi).\n- Revert \u0027x86/cpufeature: Move some of the scattered feature bits to x86_capability\u0027 (kabi).\n- Revert \u0027x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6\u0027 (kabi).\n- Revert \u0027x86/mm: Give each mm TLB flush generation a unique ID\u0027 (kabi).\n- Revert \u0027x86/speculation: Use Indirect Branch Prediction Barrier in context switch\u0027 (kabi).\n- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).\n- rsi: Fix \u0027invalid vdd\u0027 warning in mmc (bnc#1012382).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).\n- s390: Correct register corruption in critical section cleanup (bnc#1012382).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).\n- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).\n- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).\n- scsi: megaraid: silence a static checker bug (bnc#1012382).\n- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).\n- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).\n- scsi: qlogicpti: Fix an error handling path in \u0027qpti_sbus_probe()\u0027 (bsc#1082979).\n- scsi: scsi_dh: replace too broad \u0027TP9\u0027 string with the exact models (bnc#1012382).\n- scsi: sg: fix minor memory leak in error path (bsc#1082979).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).\n- scsi: ufs: fix exception event handling (bnc#1012382).\n- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).\n- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).\n- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- squashfs: be more careful about metadata corruption (bnc#1012382).\n- squashfs: more metadata hardening (bnc#1012382).\n- squashfs: more metadata hardenings (bnc#1012382).\n- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).\n- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).\n- tcp: add one more quick ack after after ECN events (bnc#1012382).\n- tcp: do not aggressively quick ack after ECN events (bnc#1012382).\n- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).\n- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).\n- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).\n- tcp: fix dctcp delayed ACK schedule (bnc#1012382).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: helpers to send special DCTCP ack (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).\n- tg3: Add higher cpu clock for 5762 (bnc#1012382).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).\n- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).\n- tracing: Fix double free of event_trigger_data (bnc#1012382).\n- tracing: Fix missing return symbol in function_graph output (bnc#1012382).\n- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).\n- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).\n- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).\n- turn off -Wattribute-alias (bnc#1012382).\n- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).\n- ubi: Fix Fastmap\u0027s update_vol() (bnc#1012382).\n- ubi: Fix races around ubi_refill_pools() (bnc#1012382).\n- ubi: Introduce vol_ignored() (bnc#1012382).\n- ubi: Rework Fastmap attach base code (bnc#1012382).\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- USB: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).\n- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).\n- USB: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- USB: serial: mos7840: fix status-register error handling (bnc#1012382).\n- USB: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).\n- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).\n- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).\n- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).\n- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).\n- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).\n- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1091860 bsc#1098253).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).\n- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to \u003casm/asm.h\u003e (bnc#1012382).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-\u003eREGs (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/bugs: Respect nospec command line option (bsc#1068032).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: preserve numbers (kabi).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).\n- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/irqflags: Provide a declaration for native_save_fl (git-fixes).\n- x86/mce: Fix incorrect \u0027Machine check from unknown source\u0027 message (bnc#1012382).\n- x86/MCE: Remove min interval polling limitation (bnc#1012382).\n- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).\n- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).\n- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).\n- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).\n- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).\n- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).\n- x86/speculation: Add \u003casm/msr-index.h\u003e dependency (bnc#1012382).\n- x86/speculation: Clean up various Spectre related details (bnc#1012382).\n- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).\n- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).\n- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).\n- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).\n- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).\n- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP3-2018-1827", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2596-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2596-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182596-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2596-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1065364", "url": "https://bugzilla.suse.com/1065364" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1082653", "url": "https://bugzilla.suse.com/1082653" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1086457", "url": "https://bugzilla.suse.com/1086457" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1091860", "url": "https://bugzilla.suse.com/1091860" }, { "category": "self", "summary": "SUSE Bug 1092001", "url": "https://bugzilla.suse.com/1092001" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1095643", "url": "https://bugzilla.suse.com/1095643" }, { "category": "self", "summary": "SUSE Bug 1096254", "url": "https://bugzilla.suse.com/1096254" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097771", "url": "https://bugzilla.suse.com/1097771" }, { "category": "self", "summary": "SUSE Bug 1098253", "url": "https://bugzilla.suse.com/1098253" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1099792", "url": "https://bugzilla.suse.com/1099792" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100843", "url": "https://bugzilla.suse.com/1100843" }, { "category": "self", "summary": "SUSE Bug 1100930", "url": "https://bugzilla.suse.com/1100930" }, { "category": "self", "summary": "SUSE Bug 1101296", "url": "https://bugzilla.suse.com/1101296" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101658", "url": "https://bugzilla.suse.com/1101658" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1101822", "url": "https://bugzilla.suse.com/1101822" }, { "category": "self", "summary": "SUSE Bug 1101841", "url": "https://bugzilla.suse.com/1101841" }, { "category": "self", "summary": "SUSE Bug 1102188", "url": "https://bugzilla.suse.com/1102188" }, { "category": "self", "summary": "SUSE Bug 1102197", "url": "https://bugzilla.suse.com/1102197" }, { "category": "self", "summary": "SUSE Bug 1102203", "url": "https://bugzilla.suse.com/1102203" }, { "category": "self", "summary": "SUSE Bug 1102205", "url": "https://bugzilla.suse.com/1102205" }, { "category": "self", "summary": "SUSE Bug 1102207", "url": "https://bugzilla.suse.com/1102207" }, { "category": "self", "summary": "SUSE Bug 1102211", "url": "https://bugzilla.suse.com/1102211" }, { "category": "self", "summary": "SUSE Bug 1102214", "url": "https://bugzilla.suse.com/1102214" }, { "category": "self", "summary": "SUSE Bug 1102215", "url": "https://bugzilla.suse.com/1102215" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102394", "url": "https://bugzilla.suse.com/1102394" }, { "category": "self", "summary": "SUSE Bug 1102683", "url": "https://bugzilla.suse.com/1102683" }, { "category": "self", "summary": "SUSE Bug 1102715", "url": "https://bugzilla.suse.com/1102715" }, { "category": "self", "summary": "SUSE Bug 1102797", "url": "https://bugzilla.suse.com/1102797" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103269", "url": "https://bugzilla.suse.com/1103269" }, { "category": "self", "summary": "SUSE Bug 1103445", "url": "https://bugzilla.suse.com/1103445" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE Bug 1103717", "url": "https://bugzilla.suse.com/1103717" }, { "category": "self", "summary": "SUSE Bug 1103745", "url": "https://bugzilla.suse.com/1103745" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE Bug 1104365", "url": "https://bugzilla.suse.com/1104365" }, { "category": "self", "summary": "SUSE Bug 1104494", "url": "https://bugzilla.suse.com/1104494" }, { "category": "self", "summary": "SUSE Bug 1104495", "url": "https://bugzilla.suse.com/1104495" }, { "category": "self", "summary": "SUSE Bug 1104897", "url": "https://bugzilla.suse.com/1104897" }, { "category": "self", "summary": "SUSE Bug 1105292", "url": "https://bugzilla.suse.com/1105292" }, { "category": "self", "summary": "SUSE Bug 970506", "url": "https://bugzilla.suse.com/970506" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9363 page", "url": "https://www.suse.com/security/cve/CVE-2018-9363/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-03T15:29:13Z", "generator": { "date": "2018-09-03T15:29:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2596-1", "initial_release_date": "2018-09-03T15:29:13Z", "revision_history": [ { "date": "2018-09-03T15:29:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.4.147-3.20.1.noarch", "product": { "name": "kernel-devel-rt-4.4.147-3.20.1.noarch", "product_id": "kernel-devel-rt-4.4.147-3.20.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.4.147-3.20.1.noarch", "product": { "name": "kernel-source-rt-4.4.147-3.20.1.noarch", "product_id": "kernel-source-rt-4.4.147-3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "dlm-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "dlm-kmp-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt-base-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt-base-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt-devel-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt-devel-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-syms-rt-4.4.147-3.20.1.x86_64", "product_id": "kernel-syms-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.4.147-3.20.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch" }, "product_reference": "kernel-devel-rt-4.4.147-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt-base-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt-devel-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.4.147-3.20.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch" }, "product_reference": "kernel-source-rt-4.4.147-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-syms-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-9363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9363" } ], "notes": [ { "category": "general", "text": "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9363", "url": "https://www.suse.com/security/cve/CVE-2018-9363" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-9363", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1105292 for CVE-2018-9363", "url": "https://bugzilla.suse.com/1105292" }, { "category": "external", "summary": "SUSE Bug 1105293 for CVE-2018-9363", "url": "https://bugzilla.suse.com/1105293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "important" } ], "title": "CVE-2018-9363" } ] }
suse-su-2018:3265-1
Vulnerability from csaf_suse
Published
2018-10-22 08:28
Modified
2018-10-22 08:28
Summary
Security update for the Linux Kernel (Live Patch 38 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 38 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_146 fixes several issues.
The following security issues were fixed:
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
Patchnames
SUSE-SLE-SERVER-12-2018-2355
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 38 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_146 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bsc#1107832).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-2355", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3265-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3265-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183265-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3265-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1107832", "url": "https://bugzilla.suse.com/1107832" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 38 for SLE 12)", "tracking": { "current_release_date": "2018-10-22T08:28:26Z", "generator": { "date": "2018-10-22T08:28:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3265-1", "initial_release_date": "2018-10-22T08:28:26Z", "revision_history": [ { "date": "2018-10-22T08:28:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-22T08:28:26Z", "details": "moderate" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-22T08:28:26Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2474-1
Vulnerability from csaf_suse
Published
2018-08-21 15:13
Modified
2018-08-21 15:13
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-23 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-12904: In arch/x86/kvm/vmx.c local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL (bsc#1099258).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1739
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-23 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2018-12904: In arch/x86/kvm/vmx.c local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL (bsc#1099258).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Live-Patching-15-2018-1739", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2474-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2474-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182474-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2474-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099258", "url": "https://bugzilla.suse.com/1099258" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12904 page", "url": "https://www.suse.com/security/cve/CVE-2018-12904/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15)", "tracking": { "current_release_date": "2018-08-21T15:13:27Z", "generator": { "date": "2018-08-21T15:13:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2474-1", "initial_release_date": "2018-08-21T15:13:27Z", "revision_history": [ { "date": "2018-08-21T15:13:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64", "product_id": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-12904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12904" } ], "notes": [ { "category": "general", "text": "In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12904", "url": "https://www.suse.com/security/cve/CVE-2018-12904" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12904", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099183 for CVE-2018-12904", "url": "https://bugzilla.suse.com/1099183" }, { "category": "external", "summary": "SUSE Bug 1099258 for CVE-2018-12904", "url": "https://bugzilla.suse.com/1099258" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "important" } ], "title": "CVE-2018-12904" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2787-1
Vulnerability from csaf_suse
Published
2018-09-21 10:04
Modified
2018-09-21 10:04
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_106 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-SERVER-12-2018-1951,SUSE-SLE-SERVER-12-2018-1952,SUSE-SLE-SERVER-12-2018-1953,SUSE-SLE-SERVER-12-2018-1954,SUSE-SLE-SERVER-12-2018-1955,SUSE-SLE-SERVER-12-2018-1956,SUSE-SLE-SERVER-12-2018-1957,SUSE-SLE-SERVER-12-2018-1958,SUSE-SLE-SERVER-12-2018-1959,SUSE-SLE-SERVER-12-2018-1960,SUSE-SLE-SERVER-12-2018-1961
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_106 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1951,SUSE-SLE-SERVER-12-2018-1952,SUSE-SLE-SERVER-12-2018-1953,SUSE-SLE-SERVER-12-2018-1954,SUSE-SLE-SERVER-12-2018-1955,SUSE-SLE-SERVER-12-2018-1956,SUSE-SLE-SERVER-12-2018-1957,SUSE-SLE-SERVER-12-2018-1958,SUSE-SLE-SERVER-12-2018-1959,SUSE-SLE-SERVER-12-2018-1960,SUSE-SLE-SERVER-12-2018-1961", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2787-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2787-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182787-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2787-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "tracking": { "current_release_date": "2018-09-21T10:04:52Z", "generator": { "date": "2018-09-21T10:04:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2787-1", "initial_release_date": "2018-09-21T10:04:52Z", "revision_history": [ { "date": "2018-09-21T10:04:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-21T10:04:52Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-21T10:04:52Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2961-1
Vulnerability from csaf_suse
Published
2018-10-01 16:05
Modified
2018-10-01 16:05
Summary
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.143-94_47 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-2103,SUSE-SLE-Live-Patching-12-SP3-2018-2105,SUSE-SLE-Live-Patching-12-SP3-2018-2106,SUSE-SLE-Live-Patching-12-SP3-2018-2107,SUSE-SLE-Live-Patching-12-SP3-2018-2110
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.143-94_47 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-2103,SUSE-SLE-Live-Patching-12-SP3-2018-2105,SUSE-SLE-Live-Patching-12-SP3-2018-2106,SUSE-SLE-Live-Patching-12-SP3-2018-2107,SUSE-SLE-Live-Patching-12-SP3-2018-2110", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2961-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2961-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182961-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2961-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-10-01T16:05:32Z", "generator": { "date": "2018-10-01T16:05:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2961-1", "initial_release_date": "2018-10-01T16:05:32Z", "revision_history": [ { "date": "2018-10-01T16:05:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:32Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:32Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:32Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2019:2601-1
Vulnerability from csaf_suse
Published
2019-10-08 12:35
Modified
2019-10-08 12:35
Summary
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_120 fixes several issues.
The following security issues were fixed:
- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).
- CVE-2018-5390: Fixed a denial of service ('SegmentSmack') in tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet (bsc#1102682).
Patchnames
SUSE-2019-2601,SUSE-SLE-SAP-12-SP2-2019-2601,SUSE-SLE-SERVER-12-SP2-2019-2601
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_120 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021).\n- CVE-2018-5390: Fixed a denial of service (\u0027SegmentSmack\u0027) in tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet (bsc#1102682).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2601,SUSE-SLE-SAP-12-SP2-2019-2601,SUSE-SLE-SERVER-12-SP2-2019-2601", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2601-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2601-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192601-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2601-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1151021", "url": "https://bugzilla.suse.com/1151021" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14835 page", "url": "https://www.suse.com/security/cve/CVE-2019-14835/" } ], "title": "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP2)", "tracking": { "current_release_date": "2019-10-08T12:35:10Z", "generator": { "date": "2019-10-08T12:35:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2601-1", "initial_release_date": "2019-10-08T12:35:10Z", "revision_history": [ { "date": "2019-10-08T12:35:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-08T12:35:10Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2019-14835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14835" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14835", "url": "https://www.suse.com/security/cve/CVE-2019-14835" }, { "category": "external", "summary": "SUSE Bug 1150112 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1150112" }, { "category": "external", "summary": "SUSE Bug 1151021 for CVE-2019-14835", "url": "https://bugzilla.suse.com/1151021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_120-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-10-08T12:35:10Z", "details": "moderate" } ], "title": "CVE-2019-14835" } ] }
suse-su-2018:2472-1
Vulnerability from csaf_suse
Published
2018-08-21 15:13
Modified
2018-08-21 15:13
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-25_3 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1737
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-25_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Live-Patching-15-2018-1737", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2472-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2472-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182472-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2472-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 15)", "tracking": { "current_release_date": "2018-08-21T15:13:14Z", "generator": { "date": "2018-08-21T15:13:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2472-1", "initial_release_date": "2018-08-21T15:13:14Z", "revision_history": [ { "date": "2018-08-21T15:13:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2019:1870-1
Vulnerability from csaf_suse
Published
2019-07-17 12:57
Modified
2019-07-17 12:57
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5390 aka 'SegmentSmack': A remote attacker even with relatively low bandwidth could have caused lots of CPU usage
by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)
- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)
- CVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)
- CVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash). (bnc#1137194)
- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)
- CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability. (bsc#1136922)
- CVE-2019-11487: An attacker could have triggered use-after-free via page reference count overflow on slow filesystems with at least of 140 GiB of RAM available. (bnc#1133190)
The following non-security bugs were fixed:
- fuse: Don't access pipe->buffers without pipe_lock() (Prerequisity for CVE-2019-11487, bsc#1133190).
- fuse: call pipe_buf_release() under pipe lock (Prerequisity for CVE-2019-11487, bsc#1133190).
- mm: /proc/pid/maps: Check permissions when opening proc pid maps (bsc#1130159).
- pipe: add pipe_buf_get() helper (Prerequisity for CVE-2019-11487, bsc#1133190).
- tcp: refine memory limit test in tcp_fragment() after CVE-2019-11478 fix (bsc#1139751).
- x86/bugs: do not default to IBRS even on SKL (bsc#1112824).
Patchnames
SUSE-2019-1870,SUSE-SLE-Module-Public-Cloud-12-2019-1870,SUSE-SLE-SAP-12-SP1-2019-1870,SUSE-SLE-SERVER-12-SP1-2019-1870
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: A remote attacker even with relatively low bandwidth could have caused lots of CPU usage\n by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n- CVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395)\n- CVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash). (bnc#1137194)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293)\n- CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \u0027double fetch\u0027 vulnerability. (bsc#1136922)\n- CVE-2019-11487: An attacker could have triggered use-after-free via page reference count overflow on slow filesystems with at least of 140 GiB of RAM available. (bnc#1133190)\n\nThe following non-security bugs were fixed:\n\n- fuse: Don\u0027t access pipe-\u003ebuffers without pipe_lock() (Prerequisity for CVE-2019-11487, bsc#1133190).\n- fuse: call pipe_buf_release() under pipe lock (Prerequisity for CVE-2019-11487, bsc#1133190).\n- mm: /proc/pid/maps: Check permissions when opening proc pid maps (bsc#1130159).\n- pipe: add pipe_buf_get() helper (Prerequisity for CVE-2019-11487, bsc#1133190).\n- tcp: refine memory limit test in tcp_fragment() after CVE-2019-11478 fix (bsc#1139751).\n- x86/bugs: do not default to IBRS even on SKL (bsc#1112824).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1870,SUSE-SLE-Module-Public-Cloud-12-2019-1870,SUSE-SLE-SAP-12-SP1-2019-1870,SUSE-SLE-SERVER-12-SP1-2019-1870", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1870-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1870-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1870-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1112824", "url": "https://bugzilla.suse.com/1112824" }, { "category": "self", "summary": "SUSE Bug 1130159", "url": "https://bugzilla.suse.com/1130159" }, { "category": "self", "summary": "SUSE Bug 1133190", "url": "https://bugzilla.suse.com/1133190" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1135603", "url": "https://bugzilla.suse.com/1135603" }, { "category": "self", "summary": "SUSE Bug 1136922", "url": "https://bugzilla.suse.com/1136922" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1138293", "url": "https://bugzilla.suse.com/1138293" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7191 page", "url": "https://www.suse.com/security/cve/CVE-2018-7191/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11487 page", "url": "https://www.suse.com/security/cve/CVE-2019-11487/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12456 page", "url": "https://www.suse.com/security/cve/CVE-2019-12456/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12818 page", "url": "https://www.suse.com/security/cve/CVE-2019-12818/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-17T12:57:10Z", "generator": { "date": "2019-07-17T12:57:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1870-1", "initial_release_date": "2019-07-17T12:57:10Z", "revision_history": [ { "date": "2019-07-17T12:57:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.118.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.118.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.118.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.74-60.64.118.1.noarch", "product": { "name": "kernel-docs-3.12.74-60.64.118.1.noarch", "product_id": "kernel-docs-3.12.74-60.64.118.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.118.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.118.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.118.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.118.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.118.1.noarch", "product_id": "kernel-source-3.12.74-60.64.118.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.12.74-60.64.118.1.noarch", "product": { "name": "kernel-source-vanilla-3.12.74-60.64.118.1.noarch", "product_id": "kernel-source-vanilla-3.12.74-60.64.118.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-debug-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-debug-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-debug-base-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-debug-base-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-debug-devel-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-debug-devel-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-debug-extra-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-debug-extra-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-default-extra-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-default-extra-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-obs-build-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-obs-qa-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-obs-qa-3.12.74-60.64.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.118.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.118.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.118.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.118.1.s390x", "product_id": "kernel-default-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.118.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.118.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-default-extra-3.12.74-60.64.118.1.s390x", "product_id": "kernel-default-extra-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.118.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-obs-build-3.12.74-60.64.118.1.s390x", "product_id": "kernel-obs-build-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-obs-qa-3.12.74-60.64.118.1.s390x", "product_id": "kernel-obs-qa-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.118.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-vanilla-3.12.74-60.64.118.1.s390x", "product_id": "kernel-vanilla-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.118.1.s390x", "product_id": "kernel-vanilla-devel-3.12.74-60.64.118.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-3.12.74-60.64.118.1.s390x", "product": { "name": "kernel-zfcpdump-3.12.74-60.64.118.1.s390x", "product_id": "kernel-zfcpdump-3.12.74-60.64.118.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-debug-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-debug-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-debug-base-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-debug-base-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-debug-devel-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-debug-devel-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-debug-extra-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-debug-extra-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-default-extra-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-default-extra-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-ec2-base-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-ec2-base-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-obs-build-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-obs-build-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-obs-qa-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-obs-qa-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-vanilla-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-vanilla-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-vanilla-devel-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.12.74-60.64.118.1.x86_64", "product": { "name": "kernel-xen-extra-3.12.74-60.64.118.1.x86_64", "product_id": "kernel-xen-extra-3.12.74-60.64.118.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.118.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.118.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.118.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.118.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.118.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.118.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.118.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.118.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.118.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.118.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.118.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.118.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "low" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-7191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7191" } ], "notes": [ { "category": "general", "text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7191", "url": "https://www.suse.com/security/cve/CVE-2018-7191" }, { "category": "external", "summary": "SUSE Bug 1135603 for CVE-2018-7191", "url": "https://bugzilla.suse.com/1135603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "moderate" } ], "title": "CVE-2018-7191" }, { "cve": "CVE-2019-11487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11487" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11487", "url": "https://www.suse.com/security/cve/CVE-2019-11487" }, { "category": "external", "summary": "SUSE Bug 1133190 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133190" }, { "category": "external", "summary": "SUSE Bug 1133191 for CVE-2019-11487", "url": "https://bugzilla.suse.com/1133191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "moderate" } ], "title": "CVE-2019-11487" }, { "cve": "CVE-2019-12456", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12456" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12456", "url": "https://www.suse.com/security/cve/CVE-2019-12456" }, { "category": "external", "summary": "SUSE Bug 1136922 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136922" }, { "category": "external", "summary": "SUSE Bug 1136993 for CVE-2019-12456", "url": "https://bugzilla.suse.com/1136993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "moderate" } ], "title": "CVE-2019-12456" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-12818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12818" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12818", "url": "https://www.suse.com/security/cve/CVE-2019-12818" }, { "category": "external", "summary": "SUSE Bug 1138293 for CVE-2019-12818", "url": "https://bugzilla.suse.com/1138293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-17T12:57:10Z", "details": "low" } ], "title": "CVE-2019-12818" } ] }
suse-su-2018:2344-2
Vulnerability from csaf_suse
Published
2018-10-18 12:49
Modified
2018-10-18 12:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
The following non-security bugs were fixed:
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand->siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-1603
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).\n- CVE-2018-9385: When printing the \u0027driver_override\u0027 option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n\nThe following non-security bugs were fixed:\n\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: do not attach backing with duplicate UUID (bsc#1076110).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix for allocator and register thread race (bsc#1076110).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: return attach error when no cache set exist (bsc#1076110).\n- bcache: segregate flash only volume write streams (bsc#1076110).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).\n- ixgbe: fix possible race in reset subtask (bsc#1101557).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).\n- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (bsc#1096130).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1603", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2344-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2344-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2344-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1094248", "url": "https://bugzilla.suse.com/1094248" }, { "category": "self", "summary": "SUSE Bug 1096130", "url": "https://bugzilla.suse.com/1096130" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097140", "url": "https://bugzilla.suse.com/1097140" }, { "category": "self", "summary": "SUSE Bug 1097551", "url": "https://bugzilla.suse.com/1097551" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098435", "url": "https://bugzilla.suse.com/1098435" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1100491", "url": "https://bugzilla.suse.com/1100491" }, { "category": "self", "summary": "SUSE Bug 1101557", "url": "https://bugzilla.suse.com/1101557" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9385 page", "url": "https://www.suse.com/security/cve/CVE-2018-9385/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-18T12:49:01Z", "generator": { "date": "2018-10-18T12:49:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2344-2", "initial_release_date": "2018-10-18T12:49:01Z", "revision_history": [ { "date": "2018-10-18T12:49:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.92.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.92.1.noarch", "product_id": "kernel-devel-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.92.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.92.1.noarch", "product_id": "kernel-macros-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.92.1.noarch", "product": { "name": "kernel-source-4.4.121-92.92.1.noarch", "product_id": "kernel-source-4.4.121-92.92.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product_id": "kernel-syms-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product": { "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product_id": "lttng-modules-2.7.1-9.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9385" } ], "notes": [ { "category": "general", "text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9385", "url": "https://www.suse.com/security/cve/CVE-2018-9385" }, { "category": "external", "summary": "SUSE Bug 1100491 for CVE-2018-9385", "url": "https://bugzilla.suse.com/1100491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-9385" } ] }
suse-su-2018:2328-1
Vulnerability from csaf_suse
Published
2018-08-14 17:02
Modified
2018-08-14 17:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5390 aka 'SegmentSmack': Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
The following non-security bugs were fixed:
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blacklist 9fb8d5dc4b64 ('stop_machine: Disable preemption when waking two stopper threads') Preemption is already disabled inside cpu_stop_queue_two_works() in SLE12-SP3 because it does not have commit 6a19005157c4 ('stop_machine: Do not disable preemption in stop_two_cpus()')
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-1566,SUSE-SLE-HA-12-SP3-2018-1566,SUSE-SLE-Live-Patching-12-SP3-2018-1566,SUSE-SLE-SDK-12-SP3-2018-1566,SUSE-SLE-SERVER-12-SP3-2018-1566,SUSE-SLE-WE-12-SP3-2018-1566
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n\nThe following non-security bugs were fixed:\n\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blacklist 9fb8d5dc4b64 (\u0027stop_machine: Disable preemption when waking two stopper threads\u0027) Preemption is already disabled inside cpu_stop_queue_two_works() in SLE12-SP3 because it does not have commit 6a19005157c4 (\u0027stop_machine: Do not disable preemption in stop_two_cpus()\u0027)\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override \u0027inline\u0027 for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm: re-enable error handling (bsc#1103884).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- kabi protect includes in include/linux/inet.h (bsc#1095643).\n- KABI protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- keys: DNS: fix parsing multiple options (bnc#1012382).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1102214).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item-\u003eci_parent (bnc#1012382).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- Revert \u0027sit: reload iphdr in ipip6_rcv\u0027 (bnc#1012382).\n- Revert \u0027x86/cpufeature: Move some of the scattered feature bits to x86_capability\u0027 (kabi).\n- Revert \u0027x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6\u0027 (kabi).\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- usb: serial: mos7840: fix status-register error handling (bnc#1012382).\n- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to \u003casm/asm.h\u003e (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-1566,SUSE-SLE-HA-12-SP3-2018-1566,SUSE-SLE-Live-Patching-12-SP3-2018-1566,SUSE-SLE-SDK-12-SP3-2018-1566,SUSE-SLE-SERVER-12-SP3-2018-1566,SUSE-SLE-WE-12-SP3-2018-1566", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2328-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2328-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182328-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2328-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1082653", "url": "https://bugzilla.suse.com/1082653" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1092001", "url": "https://bugzilla.suse.com/1092001" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1095643", "url": "https://bugzilla.suse.com/1095643" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097771", "url": "https://bugzilla.suse.com/1097771" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100930", "url": "https://bugzilla.suse.com/1100930" }, { "category": "self", "summary": "SUSE Bug 1101658", "url": "https://bugzilla.suse.com/1101658" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1102188", "url": "https://bugzilla.suse.com/1102188" }, { "category": "self", "summary": "SUSE Bug 1102197", "url": "https://bugzilla.suse.com/1102197" }, { "category": "self", "summary": "SUSE Bug 1102203", "url": "https://bugzilla.suse.com/1102203" }, { "category": "self", "summary": "SUSE Bug 1102205", "url": "https://bugzilla.suse.com/1102205" }, { "category": "self", "summary": "SUSE Bug 1102207", "url": "https://bugzilla.suse.com/1102207" }, { "category": "self", "summary": "SUSE Bug 1102211", "url": "https://bugzilla.suse.com/1102211" }, { "category": "self", "summary": "SUSE Bug 1102214", "url": "https://bugzilla.suse.com/1102214" }, { "category": "self", "summary": "SUSE Bug 1102215", "url": "https://bugzilla.suse.com/1102215" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102394", "url": "https://bugzilla.suse.com/1102394" }, { "category": "self", "summary": "SUSE Bug 1102683", "url": "https://bugzilla.suse.com/1102683" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE Bug 1103745", "url": "https://bugzilla.suse.com/1103745" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-14T17:02:07Z", "generator": { "date": "2018-08-14T17:02:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2328-1", "initial_release_date": "2018-08-14T17:02:07Z", "revision_history": [ { "date": "2018-08-14T17:02:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dpdk-devel-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-devel-16.11.6-8.7.2.aarch64", "product_id": "dpdk-devel-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "product_id": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.aarch64", "product_id": "kernel-obs-build-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "dpdk-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-16.11.6-8.7.2.aarch64", "product_id": "dpdk-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "product_id": "dpdk-thunderx-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "product": { "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "product_id": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-tools-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-tools-16.11.6-8.7.2.aarch64", "product_id": "dpdk-tools-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-default-4.4.143-94.47.1.aarch64", "product_id": "kernel-default-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-default-base-4.4.143-94.47.1.aarch64", "product_id": "kernel-default-base-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.aarch64", "product_id": "kernel-default-devel-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-syms-4.4.143-94.47.1.aarch64", "product_id": "kernel-syms-4.4.143-94.47.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.143-94.47.1.noarch", "product": { "name": "kernel-devel-4.4.143-94.47.1.noarch", "product_id": "kernel-devel-4.4.143-94.47.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.143-94.47.1.noarch", "product": { "name": "kernel-macros-4.4.143-94.47.1.noarch", "product_id": "kernel-macros-4.4.143-94.47.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.143-94.47.1.noarch", "product": { "name": "kernel-source-4.4.143-94.47.1.noarch", "product_id": "kernel-source-4.4.143-94.47.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.143-94.47.1.noarch", "product": { "name": "kernel-docs-4.4.143-94.47.1.noarch", "product_id": "kernel-docs-4.4.143-94.47.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "dlm-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "product_id": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le" } }, { "category": "product_version", "name": "dpdk-devel-16.11.6-8.7.2.ppc64le", "product": { "name": "dpdk-devel-16.11.6-8.7.2.ppc64le", "product_id": "dpdk-devel-16.11.6-8.7.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.ppc64le", "product_id": "kernel-obs-build-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "dpdk-16.11.6-8.7.2.ppc64le", "product": { "name": "dpdk-16.11.6-8.7.2.ppc64le", "product_id": "dpdk-16.11.6-8.7.2.ppc64le" } }, { "category": "product_version", "name": "dpdk-tools-16.11.6-8.7.2.ppc64le", "product": { "name": "dpdk-tools-16.11.6-8.7.2.ppc64le", "product_id": "dpdk-tools-16.11.6-8.7.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-default-4.4.143-94.47.1.ppc64le", "product_id": "kernel-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-default-base-4.4.143-94.47.1.ppc64le", "product_id": "kernel-default-base-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "product_id": "kernel-default-devel-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-syms-4.4.143-94.47.1.ppc64le", "product_id": "kernel-syms-4.4.143-94.47.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.s390x", "product_id": "cluster-md-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "dlm-kmp-default-4.4.143-94.47.1.s390x", "product_id": "dlm-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.143-94.47.1.s390x", "product_id": "gfs2-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.s390x", "product_id": "ocfs2-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.s390x", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.s390x", "product_id": "kernel-obs-build-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-4.4.143-94.47.1.s390x", "product_id": "kernel-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-base-4.4.143-94.47.1.s390x", "product_id": "kernel-default-base-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.s390x", "product_id": "kernel-default-devel-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-man-4.4.143-94.47.1.s390x", "product_id": "kernel-default-man-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.s390x", "product": { "name": "kernel-syms-4.4.143-94.47.1.s390x", "product_id": "kernel-syms-4.4.143-94.47.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-devel-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-extra-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-extra-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-syms-4.4.143-94.47.1.x86_64", "product_id": "kernel-syms-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "dlm-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "gfs2-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "product_id": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-devel-16.11.6-8.7.2.x86_64", "product": { "name": "dpdk-devel-16.11.6-8.7.2.x86_64", "product_id": "dpdk-devel-16.11.6-8.7.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.x86_64", "product_id": "kernel-obs-build-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "dpdk-16.11.6-8.7.2.x86_64", "product": { "name": "dpdk-16.11.6-8.7.2.x86_64", "product_id": "dpdk-16.11.6-8.7.2.x86_64" } }, { "category": "product_version", "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "product": { "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "product_id": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64" } }, { "category": "product_version", "name": "dpdk-tools-16.11.6-8.7.2.x86_64", "product": { "name": "dpdk-tools-16.11.6-8.7.2.x86_64", "product_id": "dpdk-tools-16.11.6-8.7.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-base-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-base-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.1-8.4.2.x86_64", "product": { "name": "lttng-modules-2.7.1-8.4.2.x86_64", "product_id": "lttng-modules-2.7.1-8.4.2.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "product_id": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-devel-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-macros-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-source-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-devel-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-devel-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-devel-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-docs-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64" }, "product_reference": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-man-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-devel-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-macros-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-source-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-syms-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-syms-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-8.4.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64" }, "product_reference": "lttng-modules-2.7.1-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64" }, "product_reference": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-man-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-devel-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-macros-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-source-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-syms-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-syms-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-8.4.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64" }, "product_reference": "lttng-modules-2.7.1-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:3029-1
Vulnerability from csaf_suse
Published
2018-10-05 11:23
Modified
2018-10-05 11:23
Summary
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.82-6_6 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-2152,SUSE-SLE-Live-Patching-12-SP3-2018-2153
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-2152,SUSE-SLE-Live-Patching-12-SP3-2018-2153", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3029-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3029-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183029-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3029-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" }, { "category": "self", "summary": "SUSE Bug 1096723", "url": "https://bugzilla.suse.com/1096723" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000026 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000026/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-10-05T11:23:56Z", "generator": { "date": "2018-10-05T11:23:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3029-1", "initial_release_date": "2018-10-05T11:23:56Z", "revision_history": [ { "date": "2018-10-05T11:23:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000026" } ], "notes": [ { "category": "general", "text": "Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000026", "url": "https://www.suse.com/security/cve/CVE-2018-1000026" }, { "category": "external", "summary": "SUSE Bug 1079384 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1079384" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096723 for CVE-2018-1000026", "url": "https://bugzilla.suse.com/1096723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-05T11:23:56Z", "details": "important" } ], "title": "CVE-2018-1000026" }, { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-05T11:23:56Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-05T11:23:56Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-05T11:23:56Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2864-1
Vulnerability from csaf_suse
Published
2018-09-25 15:51
Modified
2018-09-25 15:51
Summary
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-2006,SUSE-SLE-SAP-12-SP2-2018-2007,SUSE-SLE-SAP-12-SP2-2018-2008,SUSE-SLE-SAP-12-SP2-2018-2009,SUSE-SLE-SAP-12-SP2-2018-2010,SUSE-SLE-SERVER-12-SP2-2018-2006,SUSE-SLE-SERVER-12-SP2-2018-2007,SUSE-SLE-SERVER-12-SP2-2018-2008,SUSE-SLE-SERVER-12-SP2-2018-2009,SUSE-SLE-SERVER-12-SP2-2018-2010
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_85 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-2006,SUSE-SLE-SAP-12-SP2-2018-2007,SUSE-SLE-SAP-12-SP2-2018-2008,SUSE-SLE-SAP-12-SP2-2018-2009,SUSE-SLE-SAP-12-SP2-2018-2010,SUSE-SLE-SERVER-12-SP2-2018-2006,SUSE-SLE-SERVER-12-SP2-2018-2007,SUSE-SLE-SERVER-12-SP2-2018-2008,SUSE-SLE-SERVER-12-SP2-2018-2009,SUSE-SLE-SERVER-12-SP2-2018-2010", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2864-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2864-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182864-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2864-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-09-25T15:51:38Z", "generator": { "date": "2018-09-25T15:51:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2864-1", "initial_release_date": "2018-09-25T15:51:38Z", "revision_history": [ { "date": "2018-09-25T15:51:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:51:38Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:51:38Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-25T15:51:38Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2960-1
Vulnerability from csaf_suse
Published
2018-10-01 12:02
Modified
2018-10-01 12:02
Summary
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-2085,SUSE-SLE-SAP-12-SP1-2018-2086,SUSE-SLE-SAP-12-SP1-2018-2087,SUSE-SLE-SAP-12-SP1-2018-2088,SUSE-SLE-SAP-12-SP1-2018-2089,SUSE-SLE-SAP-12-SP1-2018-2090,SUSE-SLE-SAP-12-SP1-2018-2091,SUSE-SLE-SAP-12-SP1-2018-2092,SUSE-SLE-SAP-12-SP1-2018-2093,SUSE-SLE-SAP-12-SP1-2018-2094,SUSE-SLE-SERVER-12-SP1-2018-2085,SUSE-SLE-SERVER-12-SP1-2018-2086,SUSE-SLE-SERVER-12-SP1-2018-2087,SUSE-SLE-SERVER-12-SP1-2018-2088,SUSE-SLE-SERVER-12-SP1-2018-2089,SUSE-SLE-SERVER-12-SP1-2018-2090,SUSE-SLE-SERVER-12-SP1-2018-2091,SUSE-SLE-SERVER-12-SP1-2018-2092,SUSE-SLE-SERVER-12-SP1-2018-2093,SUSE-SLE-SERVER-12-SP1-2018-2094
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-2085,SUSE-SLE-SAP-12-SP1-2018-2086,SUSE-SLE-SAP-12-SP1-2018-2087,SUSE-SLE-SAP-12-SP1-2018-2088,SUSE-SLE-SAP-12-SP1-2018-2089,SUSE-SLE-SAP-12-SP1-2018-2090,SUSE-SLE-SAP-12-SP1-2018-2091,SUSE-SLE-SAP-12-SP1-2018-2092,SUSE-SLE-SAP-12-SP1-2018-2093,SUSE-SLE-SAP-12-SP1-2018-2094,SUSE-SLE-SERVER-12-SP1-2018-2085,SUSE-SLE-SERVER-12-SP1-2018-2086,SUSE-SLE-SERVER-12-SP1-2018-2087,SUSE-SLE-SERVER-12-SP1-2018-2088,SUSE-SLE-SERVER-12-SP1-2018-2089,SUSE-SLE-SERVER-12-SP1-2018-2090,SUSE-SLE-SERVER-12-SP1-2018-2091,SUSE-SLE-SERVER-12-SP1-2018-2092,SUSE-SLE-SERVER-12-SP1-2018-2093,SUSE-SLE-SERVER-12-SP1-2018-2094", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2960-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2960-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182960-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2960-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-10-01T12:02:50Z", "generator": { "date": "2018-10-01T12:02:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2960-1", "initial_release_date": "2018-10-01T12:02:50Z", "revision_history": [ { "date": "2018-10-01T12:02:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T12:02:50Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T12:02:50Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
ghsa-grv8-gqh3-fmc9
Vulnerability from github
Published
2022-05-13 01:16
Modified
2022-05-13 01:16
Severity ?
VLAI Severity ?
Details
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
{ "affected": [], "aliases": [ "CVE-2018-5390" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-08-06T20:29:00Z", "severity": "HIGH" }, "details": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "id": "GHSA-grv8-gqh3-fmc9", "modified": "2022-05-13T01:16:14Z", "published": "2022-05-13T01:16:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180815-0003" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K95343321" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3732-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3732-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3741-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3741-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3742-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3742-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3763-1" }, { "type": "WEB", "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4266" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "type": "WEB", "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "type": "WEB", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "type": "WEB", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "type": "WEB", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104976" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1041424" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1041434" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2018:2785
Vulnerability from csaf_redhat
Published
2018-09-25 20:51
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391.
Bug Fix(es):
* On systems running Red Hat Enterprise Linux 7 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into "NodeNotReady" state after a CPU softlockup. Consequently, the node was not available. This update fixes an irq latency source in memory compaction. As a result, nodes no longer get into "NodeNotReady" state under the described circumstances. (BZ#1596281)
* Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)" where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1612351)
* The hypervisors of Red Hat Enterprise Linux 7 virtual machines (VMs) in certain circumstances mishandled the microcode update in the kernel. As a consequence, the VMs sometimes became unresponsive when booting. This update applies an upstream patch to avoid early microcode update when running under a hypervisor. As a result, kernel hangs no longer occur in the described scenario. (BZ#1618388)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391.\n\nBug Fix(es):\n\n* On systems running Red Hat Enterprise Linux 7 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into \"NodeNotReady\" state after a CPU softlockup. Consequently, the node was not available. This update fixes an irq latency source in memory compaction. As a result, nodes no longer get into \"NodeNotReady\" state under the described circumstances. (BZ#1596281)\n\n* Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported \"Not affected\" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as \"Vulnerable\" or \"Mitigation: Kernel entry/exit barrier (TYPE)\" where TYPE is one of \"eieio\", \"hwsync\", \"fallback\", or \"unknown\". (BZ#1612351)\n\n* The hypervisors of Red Hat Enterprise Linux 7 virtual machines (VMs) in certain circumstances mishandled the microcode update in the kernel. As a consequence, the VMs sometimes became unresponsive when booting. This update applies an upstream patch to avoid early microcode update when running under a hypervisor. As a result, kernel hangs no longer occur in the described scenario. (BZ#1618388)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2785", "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2785.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:16+00:00", "generator": { "date": "2025-08-02T08:10:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2785", "initial_release_date": "2018-09-25T20:51:58+00:00", "revision_history": [ { "date": "2018-09-25T20:51:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T20:51:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.58.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.58.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.58.1.el7.x86_64", "product_id": "perf-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.58.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.58.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.58.1.el7.src", "product": { "name": "kernel-0:3.10.0-514.58.1.el7.src", "product_id": "kernel-0:3.10.0-514.58.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.58.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.58.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.58.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64", "product_id": "perf-0:3.10.0-514.58.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.58.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.58.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.58.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64le", "product_id": "perf-0:3.10.0-514.58.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.58.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.58.1.el7.s390x", "product_id": "python-perf-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.58.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.58.1.el7.s390x", "product": { "name": "perf-0:3.10.0-514.58.1.el7.s390x", "product_id": "perf-0:3.10.0-514.58.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.58.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.58.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.58.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:51:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2785" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:51:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:51:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2785" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.58.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.58.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.58.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2018:2948
Vulnerability from csaf_redhat
Published
2018-10-30 12:05
Modified
2025-08-04 12:06
Summary
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, aarch64)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
Space precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:
https://access.redhat.com/articles/3658021
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391; Qualys Research Labs for reporting CVE-2018-1120; David Rientjes (Google) for reporting CVE-2018-1000200; and Wen Xu for reporting CVE-2018-1092, CVE-2018-1094, and CVE-2018-1095. The CVE-2018-14619 issue was discovered by Florian Weimer (Red Hat) and Ondrej Mosnacek (Red Hat).
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, aarch64)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\nSpace precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article: \n\nhttps://access.redhat.com/articles/3658021\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391; Qualys Research Labs for reporting CVE-2018-1120; David Rientjes (Google) for reporting CVE-2018-1000200; and Wen Xu for reporting CVE-2018-1092, CVE-2018-1094, and CVE-2018-1095. The CVE-2018-14619 issue was discovered by Florian Weimer (Red Hat) and Ondrej Mosnacek (Red Hat).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2948", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index" }, { "category": "external", "summary": "https://access.redhat.com/articles/3658021", "url": "https://access.redhat.com/articles/3658021" }, { "category": "external", "summary": "1516257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257" }, { "category": "external", "summary": "1528312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528312" }, { "category": "external", "summary": "1528323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528323" }, { "category": "external", "summary": "1533909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533909" }, { "category": "external", "summary": "1539508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539508" }, { "category": "external", "summary": "1539706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706" }, { "category": "external", "summary": "1541846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541846" }, { "category": "external", "summary": "1547824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547824" }, { "category": "external", "summary": "1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1551051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "category": "external", "summary": "1551565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551565" }, { "category": "external", "summary": "1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "1553361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553361" }, { "category": "external", "summary": "1560777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560777" }, { "category": "external", "summary": "1560788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560788" }, { "category": "external", "summary": "1560793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560793" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1568744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568744" }, { "category": "external", "summary": "1571062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571062" }, { "category": "external", "summary": "1571623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571623" }, { "category": "external", "summary": "1573699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699" }, { "category": "external", "summary": "1575472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575472" }, { "category": "external", "summary": "1577408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577408" }, { "category": "external", "summary": "1583210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583210" }, { "category": "external", "summary": "1589324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589324" }, { "category": "external", "summary": "1590215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590215" }, { "category": "external", "summary": "1590799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590799" }, { "category": "external", "summary": "1596795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795" }, { "category": "external", "summary": "1596802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802" }, { "category": "external", "summary": "1596806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806" }, { "category": "external", "summary": "1596812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596812" }, { "category": "external", "summary": "1596828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596828" }, { "category": "external", "summary": "1596842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596842" }, { "category": "external", "summary": "1596846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596846" }, { "category": "external", "summary": "1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "1622004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622004" }, { "category": "external", "summary": "1623067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623067" }, { "category": "external", "summary": "1629636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629636" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2948.json" } ], "title": "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:06:47+00:00", "generator": { "date": "2025-08-04T12:06:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2948", "initial_release_date": "2018-10-30T12:05:20+00:00", "revision_history": [ { "date": "2018-10-30T12:05:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-30T12:05:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:06:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548412" } ], "notes": [ { "category": "description", "text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "RHBZ#1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166" } ], "release_date": "2017-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "workaround", "details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation" }, { "cve": "CVE-2017-16648", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1516257" } ], "notes": [ { "category": "description", "text": "The dvb frontend management subsystem in the Linux kernel contains a use-after-free which can allow a malicious user to write to memory that may be assigned to another kernel structure. This could create memory corruption, panic, or possibly other side affects.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and real-time kernels.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux kernel-alt package.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "RHBZ#1516257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16648", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c" }, { "cve": "CVE-2017-17805", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528312" } ], "notes": [ { "category": "description", "text": "The Salsa20 encryption algorithm in the Linux kernel, before 4.14.8, does not correctly handle zero-length inputs. This allows a local attacker the ability to use the AF_ALG-based skcipher interface to cause a denial of service (uninitialized-memory free and kernel crash) or have an unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 are vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17805" }, { "category": "external", "summary": "RHBZ#1528312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17805", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17805" } ], "release_date": "2017-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service" }, { "cve": "CVE-2017-17806", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2017-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528323" } ], "notes": [ { "category": "description", "text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel, before 4.14.8, does not validate that the underlying cryptographic hash algorithm is unkeyed. This allows a local attacker, able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3), to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, its real-time kernel and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17806" }, { "category": "external", "summary": "RHBZ#1528323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17806", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17806" } ], "release_date": "2017-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service" }, { "cve": "CVE-2017-18075", "cwe": { "id": "CWE-628", "name": "Function Call with Incorrectly Specified Arguments" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1539508" } ], "notes": [ { "category": "description", "text": "crypto/pcrypt.c in the Linux kernel, before 4.14.13, mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, its real-time kernel and Red Hat Enterprise MRG 2, as the code with the flaw is not enabled and is not built in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18075" }, { "category": "external", "summary": "RHBZ#1539508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18075", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18075" } ], "release_date": "2017-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service" }, { "cve": "CVE-2017-18208", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1551565" } ], "notes": [ { "category": "description", "text": "The madvise_willneed function in the Linux kernel allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "RHBZ#1551565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18208", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18208" }, { "category": "external", "summary": "https://lwn.net/Articles/618064/", "url": "https://lwn.net/Articles/618064/" }, { "category": "external", "summary": "https://www.kernel.org/doc/Documentation/filesystems/dax.txt", "url": "https://www.kernel.org/doc/Documentation/filesystems/dax.txt" } ], "release_date": "2017-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service" }, { "cve": "CVE-2017-18344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610958" } ], "notes": [ { "category": "description", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "RHBZ#1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344" } ], "release_date": "2017-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "workaround", "details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c" }, { "cve": "CVE-2018-1065", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1547824" } ], "notes": [ { "category": "description", "text": "A flaw was found in the netfilter/iptables subsystem. A user with the netfilter modification capabilities could insert a rule which could panic the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "RHBZ#1547824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1065", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065" } ], "release_date": "2018-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash" }, { "cve": "CVE-2018-1068", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552048" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "RHBZ#1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068" } ], "release_date": "2018-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c" }, { "acknowledgments": [ { "names": [ "Wen Xu" ] } ], "cve": "CVE-2018-1092", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1560777" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/mballoc.c:ext4_process_freed_data() function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted ext4 image to cause a kernel panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "RHBZ#1560777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1092", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092" } ], "release_date": "2018-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image" }, { "acknowledgments": [ { "names": [ "Wen Xu" ] } ], "cve": "CVE-2018-1094", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1560788" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/xattr.c:ext4_xattr_inode_hash() function. An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a NULL pointer dereference with a crafted ext4 image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "RHBZ#1560788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094" } ], "release_date": "2018-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image" }, { "acknowledgments": [ { "names": [ "Wen Xu" ] } ], "cve": "CVE-2018-1095", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1560793" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulnerable to an out-of-bound access bug in the fs/posix_acl.c:get_acl() function. An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a system crash or other unspecified impact with a crafted ext4 image. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1095" }, { "category": "external", "summary": "RHBZ#1560793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1095", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095" } ], "release_date": "2018-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image" }, { "cve": "CVE-2018-1118", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1573699" } ], "notes": [ { "category": "description", "text": "The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "RHBZ#1573699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1118", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1118" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118" } ], "release_date": "2018-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-1120", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575472" } ], "notes": [ { "category": "description", "text": "By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1120" }, { "category": "external", "summary": "RHBZ#1575472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1120", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1120" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2018/q2/122", "url": "http://seclists.org/oss-sec/2018/q2/122" } ], "release_date": "2018-05-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "cve": "CVE-2018-5344", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1533909" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of loopback devices. An attacker, who has permissions to setup loopback disks, may create a denial of service or other unspecified actions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5344" }, { "category": "external", "summary": "RHBZ#1533909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5344" } ], "release_date": "2018-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-5750", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1539706" } ], "notes": [ { "category": "description", "text": "The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel, through 4.14.15, allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2, as KASLR feature is not present or enabled in these products.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5750" }, { "category": "external", "summary": "RHBZ#1539706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750" } ], "release_date": "2017-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass" }, { "cve": "CVE-2018-5803", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1551051" } ], "notes": [ { "category": "description", "text": "An error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP, packet length can be exploited by a malicious local user to cause a kernel crash and a DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "RHBZ#1551051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5803", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803" } ], "release_date": "2018-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service" }, { "cve": "CVE-2018-5848", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2018-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590799" } ], "notes": [ { "category": "description", "text": "In the function wmi_set_ie() in the Linux kernel the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u2018ie_len\u2019 argument can cause a buffer overflow and thus a memory corruption leading to a system crash or other or unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "RHBZ#1590799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5848", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5848" } ], "release_date": "2017-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-7757", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1553361" } ], "notes": [ { "category": "description", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel allows local users to cause a denial of service (kernel memory exhaustion) via multiple read accesses to files in the /sys/class/sas_phy directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "RHBZ#1553361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7757", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757" } ], "release_date": "2018-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c" }, { "cve": "CVE-2018-8781", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1571062" } ], "notes": [ { "category": "description", "text": "A an integer overflow vulnerability was discovered in the Linux kernel, from version 3.4 through 4.15, in the drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() function. An attacker with access to the udldrmfb driver could exploit this to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "RHBZ#1571062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571062" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8781", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8781" } ], "release_date": "2018-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space" }, { "cve": "CVE-2018-9363", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1623067" } ], "notes": [ { "category": "description", "text": "A buffer overflow due to a singed-unsigned comparsion was found in hidp_process_report() in the net/bluetooth/hidp/core.c in the Linux kernel. The buffer length is an unsigned int but gets cast to a signed int which in certain conditions can lead to a system panic and a denial-of-service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Buffer overflow in hidp_process_report", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-9363" }, { "category": "external", "summary": "RHBZ#1623067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-9363", "url": "https://www.cve.org/CVERecord?id=CVE-2018-9363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-9363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9363" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Buffer overflow in hidp_process_report" }, { "cve": "CVE-2018-10322", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1571623" } ], "notes": [ { "category": "description", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel can cause a NULL pointer dereference in xfs_ilock_attr_map_shared function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted xfs filesystem image to cause a kernel panic and thus a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "RHBZ#1571623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10322", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322" } ], "release_date": "2018-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service" }, { "cve": "CVE-2018-10877", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596795" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel ext4 filesystem. An out-of-bound access is possible in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "RHBZ#1596795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10877", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877" } ], "release_date": "2018-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image" }, { "cve": "CVE-2018-10878", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596802" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "RHBZ#1596802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10878", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10878" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878" } ], "release_date": "2018-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image" }, { "cve": "CVE-2018-10879", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596806" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "RHBZ#1596806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10879", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file" }, { "cve": "CVE-2018-10880", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596812" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem code. A stack-out-of-bounds write in ext4_update_inline_data() is possible when mounting and writing to a crafted ext4 image. An attacker could use this to cause a system crash and a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack-out-of-bounds write in ext4_update_inline_data function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "RHBZ#1596812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10880", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880" } ], "release_date": "2018-06-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack-out-of-bounds write in ext4_update_inline_data function" }, { "cve": "CVE-2018-10881", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596828" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "RHBZ#1596828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596828" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10881", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881" } ], "release_date": "2018-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image" }, { "cve": "CVE-2018-10882", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596842" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in the fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack-out-of-bounds write infs/jbd2/transaction.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "RHBZ#1596842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10882", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10882" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882" } ], "release_date": "2018-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack-out-of-bounds write infs/jbd2/transaction.c" }, { "cve": "CVE-2018-10883", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596846" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "RHBZ#1596846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10883", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883" } ], "release_date": "2018-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function" }, { "cve": "CVE-2018-10940", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1577408" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, before 4.16.6 where the cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "RHBZ#1577408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c" }, { "cve": "CVE-2018-11506", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2018-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1583210" } ], "notes": [ { "category": "description", "text": "The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel allows local users to cause a denial of service via a stack-based buffer overflow or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11506" }, { "category": "external", "summary": "RHBZ#1583210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583210" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11506", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11506" } ], "release_date": "2018-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact" }, { "cve": "CVE-2018-12232", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590215" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference issue was found in the Linux kernel. If the close() and fchownat() system calls share a socket file descriptor as an argument, then the two calls can race and trigger a NULL pointer dereference leading to a system crash and a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "RHBZ#1590215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12232", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12232" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232" } ], "release_date": "2018-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor" }, { "cve": "CVE-2018-13405", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1599161" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "RHBZ#1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-13405", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405" } ], "release_date": "2018-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members" }, { "acknowledgments": [ { "names": [ "Florian Weimer", "Ondrej Mosnacek" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-14619", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1622004" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto subsystem that allowed an attacker \r\nto crash the system or possibly escalate privileges with a specially crafted program.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crash (possible privesc) in kernel crypto api.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14619" }, { "category": "external", "summary": "RHBZ#1622004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14619", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14619" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc" } ], "release_date": "2018-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crash (possible privesc) in kernel crypto api." }, { "cve": "CVE-2018-14641", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2018-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629636" } ], "notes": [ { "category": "description", "text": "A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14641" }, { "category": "external", "summary": "RHBZ#1629636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14641", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14641" } ], "release_date": "2018-09-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()" }, { "cve": "CVE-2018-1000026", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1541846" } ], "notes": [ { "category": "description", "text": "Improper validation in the bnx2x network card driver of the Linux kernel version 4.15 can allow for denial of service (DoS) attacks via a packet with a gso_size larger than ~9700 bytes. Untrusted guest VMs can exploit this vulnerability in the host machine, causing a crash in the network card.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as supported configurations are not affected.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000026" }, { "category": "external", "summary": "RHBZ#1541846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000026", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026" } ], "release_date": "2018-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet" }, { "acknowledgments": [ { "names": [ "David Rientjes" ], "organization": "Google" } ], "cve": "CVE-2018-1000200", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568744" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel where an out of memory (oom) killing of a process that has large spans of mlocked memory can result in deferencing a NULL pointer, leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference on OOM kill of large mlocked process", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000200" }, { "category": "external", "summary": "RHBZ#1568744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000200", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000200" } ], "release_date": "2018-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference on OOM kill of large mlocked process" }, { "cve": "CVE-2018-1000204", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1589324" } ], "notes": [ { "category": "description", "text": "A malformed SG_IO ioctl issued for a SCSI device in the Linux kernel leads to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Infoleak caused by incorrect handling of the SG_IO ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "RHBZ#1589324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204" } ], "release_date": "2018-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Infoleak caused by incorrect handling of the SG_IO ioctl" } ] }
rhsa-2018:2390
Vulnerability from csaf_redhat
Published
2018-08-14 18:31
Modified
2025-08-03 22:19
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 16th August 2018]
The original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Bug Fix(es):
* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 16th August 2018]\nThe original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\n* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.\n\nBug Fix(es):\n\n* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2390", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1501878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878" }, { "category": "external", "summary": "1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1563994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2390.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T22:19:17+00:00", "generator": { "date": "2025-08-03T22:19:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2390", "initial_release_date": "2018-08-14T18:31:23+00:00", "revision_history": [ { "date": "2018-08-14T18:31:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T09:52:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T22:19:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64", "product_id": "perf-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.i686", "product": { "name": "perf-0:2.6.32-754.3.5.el6.i686", "product_id": "perf-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686", "product_id": "python-perf-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.3.5.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.3.5.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.3.5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.src", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.src", "product_id": "kernel-0:2.6.32-754.3.5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product_id": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "perf-0:2.6.32-754.3.5.el6.s390x", "product_id": "perf-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product_id": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64", "product_id": "perf-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563994" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the snd_pcm_info() function in the ALSA subsystem in the Linux kernel allows attackers to induce a kernel memory corruption and possibly crash or lock up a system. Due to the nature of the flaw, a privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "RHBZ#1563994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-0861", "url": "https://www.cve.org/CVERecord?id=CVE-2017-0861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861" } ], "release_date": "2017-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation" }, { "cve": "CVE-2017-15265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1501878" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in snd_seq_ioctl_create_port()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "RHBZ#1501878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265" } ], "release_date": "2017-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "workaround", "details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in snd_seq_ioctl_create_port()" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" }, { "cve": "CVE-2018-1000004", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535315" } ], "notes": [ { "category": "description", "text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sound system can lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "RHBZ#1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004" } ], "release_date": "2018-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sound system can lead to denial of service" } ] }
rhsa-2018:2924
Vulnerability from csaf_redhat
Published
2018-10-16 14:50
Modified
2025-08-02 08:09
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625334)
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629633)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the \"__max_smt_threads()\" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625334)\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629633)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2924", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2924.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:09:51+00:00", "generator": { "date": "2025-08-02T08:09:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2924", "initial_release_date": "2018-10-16T14:50:38+00:00", "revision_history": [ { "date": "2018-10-16T14:50:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-16T14:50:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:09:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64", "product_id": "perf-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.76.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.76.2.el6.src", "product": { "name": "kernel-0:2.6.32-504.76.2.el6.src", "product_id": "kernel-0:2.6.32-504.76.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.76.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.76.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.76.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.76.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.src", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T14:50:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.76.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.76.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2791
Vulnerability from csaf_redhat
Published
2018-09-25 20:24
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391.
Bug Fix(es):
* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625330)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391.\n\nBug Fix(es):\n\n* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the \"__max_smt_threads()\" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625330)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2791", "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2791.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:22+00:00", "generator": { "date": "2025-08-02T08:10:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2791", "initial_release_date": "2018-09-25T20:24:43+00:00", "revision_history": [ { "date": "2018-09-25T20:24:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T20:24:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.93.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.93.1.el6.x86_64", "product_id": "perf-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.93.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.93.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.93.1.el6.x86_64", "product_id": "kernel-0:2.6.32-358.93.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.93.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.93.1.el6.src", "product": { "name": "kernel-0:2.6.32-358.93.1.el6.src", "product_id": "kernel-0:2.6.32-358.93.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.93.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.93.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.93.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.93.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.93.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.93.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.93.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.93.1.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.93.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.93.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.93.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.93.1.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.93.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.93.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:24:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2791" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:24:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:24:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2791" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.93.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.93.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.93.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2018:2384
Vulnerability from csaf_redhat
Published
2018-08-14 18:49
Modified
2025-08-03 19:14
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3527791
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3527791", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2384", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://access.redhat.com/articles/3527791", "url": "https://access.redhat.com/articles/3527791" }, { "category": "external", "summary": "1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2384.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T19:14:27+00:00", "generator": { "date": "2025-08-03T19:14:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2384", "initial_release_date": "2018-08-14T18:49:36+00:00", "revision_history": [ { "date": "2018-08-14T18:49:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T18:49:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T19:14:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product_id": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64", "product_id": "perf-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.src", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.src", "product_id": "kernel-0:3.10.0-862.11.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.11.6.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product_id": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.11.6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64", "product_id": "perf-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product_id": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "perf-0:3.10.0-862.11.6.el7.s390x", "product_id": "perf-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product_id": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535173" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s skcipher component, which affects the skcipher_recvmsg function. Attackers using a specific input can lead to a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, and kernel-alt packages.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and real-time kernels.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "RHBZ#1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13215", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crypto: privilege escalation in skcipher_recvmsg function" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2018:2933
Vulnerability from csaf_redhat
Published
2018-10-16 18:56
Modified
2025-08-02 08:10
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.
Bug Fix(es):
* Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). As a result, the system no longer hangs in the described scenario. (BZ#1619630)
* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the "__max_smt_threads()" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625333)
* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629632)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: Integer overflow in Linux\u0027s create_elf_tables function (CVE-2018-14634)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391 and Qualys Research Labs for reporting CVE-2018-14634.\n\nBug Fix(es):\n\n* Previously, invalid headers in the sk_buff struct led to an indefinite loop in the tcp_collapse() function. As a consequence, the system became unresponsive. This update backports the upstream changes that remove the problematic code in tcp_collapse(). As a result, the system no longer hangs in the described scenario. (BZ#1619630)\n\n* After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the \"__max_smt_threads()\" function has been fixed. As a result, both threads are now detected correctly in the described situation. (BZ#1625333)\n\n* Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF) mitigation state on systems without Extended Page Tables (EPT) support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629632)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2933", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2933.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:10:40+00:00", "generator": { "date": "2025-08-02T08:10:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2933", "initial_release_date": "2018-10-16T18:56:07+00:00", "revision_history": [ { "date": "2018-10-16T18:56:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-16T18:56:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:10:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.93.2.el6.x86_64", "product_id": "perf-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.93.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.93.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.93.2.el6.src", "product": { "name": "kernel-0:2.6.32-431.93.2.el6.src", "product_id": "kernel-0:2.6.32-431.93.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.93.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.93.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.93.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.93.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-14634", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1624498" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the Linux kernel\u0027s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Linux\u0027s create_elf_tables function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw.\n\nSystems with less than 32GB of memory are very unlikely to be affected by this issue due to memory demands during exploitation.\n\nThis issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the version of the kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14634" }, { "category": "external", "summary": "RHBZ#1624498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1624498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14634", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14634" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14634" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy", "url": "https://access.redhat.com/security/vulnerabilities/mutagen-astronomy" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2018/09/25/4", "url": "https://www.openwall.com/lists/oss-security/2018/09/25/4" } ], "release_date": "2018-09-25T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-16T18:56:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "category": "workaround", "details": "To mitigate the issue:\n\nEnable and install kernel-debuginfo packages as per https://access.redhat.com/solutions/666123\n\n1) On the host, save the following in a file with the \".stp\" extension:\n\n// CVE-2018-14634\n//\n// Theory of operations: adjust the thread\u0027s # rlimit-in-effect around\n// calls to the vulnerable get_arg_page() function so as to encompass\n// the newly required _STK_LIM / 4 * 3 maximum.\n\n// Complication: the rlimit is stored in a current-\u003e structure that\n// is shared across the threads of the process. They may concurrently\n// invoke this operation.\n\nfunction clamp_stack_rlim_cur:long ()\n%{\n struct rlimit *rlim = current-\u003esignal-\u003erlim;\n unsigned long rlim_cur = READ_ONCE(rlim[RLIMIT_STACK].rlim_cur);\n\n unsigned long limit = _STK_LIM / 4 * 3;\n limit *= 4; // multiply it back up, to the scale used by rlim_cur\n\n if (rlim_cur \u003e limit) {\n WRITE_ONCE(rlim[RLIMIT_STACK].rlim_cur, limit);\n STAP_RETURN(limit);\n } else\n STAP_RETURN(0);\n%}\n\nprobe kernel.function(\"copy_strings\").call\n{\n l = clamp_stack_rlim_cur()\n if (l)\n printf(\"lowered process %s(%d) STACK rlim_cur to %p\\n\",\n execname(), pid(), l)\n}\n\nprobe begin {\n\tprintf(\"CVE-2018-14634 mitigation loaded\\n\")\n\n}\n\nprobe end {\n\tprintf(\"CVE-2018-14634 mitigation unloaded\\n\")\n}\n\n2) Install the \"systemtap\" package and any required dependencies. Refer\nto the \"2. Using SystemTap\" chapter in the Red Hat Enterprise Linux\n\"SystemTap Beginners Guide\" document, available from docs.redhat.com,\nfor information on installing the required -debuginfo and matching kernel-devel packages\n\n3) Run the \"stap -g [filename-from-step-1].stp\" command as root.\n\nIf the host is rebooted, the changes will be lost and the script must be\nrun again.\n\n\nAlternatively, build the systemtap script on a development system with\n\"stap -g -p 4 [filename-from-step-1].stp\", distribute the resulting\nkernel module to all affected systems, and run \"staprun -L \u003cmodule\u003e\" on those.\nWhen using this approach only systemtap-runtime package is required on\nthe affected systems. Please notice that the kernel version must be the same\nacross all systems.\n\n\nThis may not be a suitable workaround if your application uses massive amounts of stack space. Please consider this if there are any adverse affects when running this mitigation.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.93.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.93.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.93.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Linux\u0027s create_elf_tables function" } ] }
rhsa-2018:2776
Vulnerability from csaf_redhat
Published
2018-09-25 20:51
Modified
2025-08-02 05:18
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.
Bug Fix(es):
* Previously, making the total buffer size bigger than the memory size for early allocation through the trace_buf_size boot option, made the system become unresponsive at the boot stage. This update introduces a change in the early memory allocation. As a result, the system no longer hangs in the above described scenario. (BZ#1588365)
* When inserting objects with the same keys, made the rhlist implementation corrupt the chain pointers. As a consequence, elements were missing on removal and traversal. This patch updates the chain pointers correctly. As a result, there are no missing elements on removal and traversal in the above-described scenario. (BZ#1601008)
* Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported "Not affected" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as "Vulnerable" or "Mitigation: Kernel entry/exit barrier (TYPE)" where TYPE is one of "eieio", "hwsync", "fallback", or "unknown". (BZ#1612352)
* Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618389)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, making the total buffer size bigger than the memory size for early allocation through the trace_buf_size boot option, made the system become unresponsive at the boot stage. This update introduces a change in the early memory allocation. As a result, the system no longer hangs in the above described scenario. (BZ#1588365)\n\n* When inserting objects with the same keys, made the rhlist implementation corrupt the chain pointers. As a consequence, elements were missing on removal and traversal. This patch updates the chain pointers correctly. As a result, there are no missing elements on removal and traversal in the above-described scenario. (BZ#1601008)\n\n* Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported \"Not affected\" on both CPU architectures. This fix updates the kernel source code to properly report the SSBD status either as \"Vulnerable\" or \"Mitigation: Kernel entry/exit barrier (TYPE)\" where TYPE is one of \"eieio\", \"hwsync\", \"fallback\", or \"unknown\". (BZ#1612352)\n\n* Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618389)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2776", "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2776.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:18:44+00:00", "generator": { "date": "2025-08-02T05:18:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2776", "initial_release_date": "2018-09-25T20:51:28+00:00", "revision_history": [ { "date": "2018-09-25T20:51:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T20:51:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:18:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.39.1.el7.x86_64", "product_id": "perf-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.39.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.39.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "perf-0:3.10.0-693.39.1.el7.s390x", "product_id": "perf-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.39.1.el7.s390x", "product_id": "python-perf-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.39.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.39.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64", "product_id": "perf-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.39.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.39.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "perf-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.39.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.39.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.39.1.el7.src", "product": { "name": "kernel-0:3.10.0-693.39.1.el7.src", "product_id": "kernel-0:3.10.0-693.39.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.39.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.39.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.39.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.39.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.39.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:51:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2776" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.39.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.39.1.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.39.1.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.39.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2645
Vulnerability from csaf_redhat
Published
2018-09-04 14:04
Modified
2025-08-02 05:18
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2645", "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/cve-2018-5390", "url": "https://access.redhat.com/security/cve/cve-2018-5390" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2645.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T05:18:34+00:00", "generator": { "date": "2025-08-02T05:18:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2645", "initial_release_date": "2018-09-04T14:04:16+00:00", "revision_history": [ { "date": "2018-09-04T14:04:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-04T14:04:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:18:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.62.1.el6.x86_64", "product_id": "perf-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.62.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.62.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.62.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.62.1.el6.i686", "product_id": "python-perf-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.62.1.el6.i686", "product": { "name": "perf-0:2.6.32-573.62.1.el6.i686", "product_id": "perf-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.62.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.62.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.62.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.62.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.62.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.62.1.el6.src", "product": { "name": "kernel-0:2.6.32-573.62.1.el6.src", "product_id": "kernel-0:2.6.32-573.62.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.62.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.62.1.el6.s390x", "product_id": "python-perf-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "perf-0:2.6.32-573.62.1.el6.s390x", "product_id": "perf-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.62.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.62.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.62.1.el6.ppc64", "product_id": "perf-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.62.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.62.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-04T14:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2645" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.62.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.62.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.62.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2790
Vulnerability from csaf_redhat
Published
2018-09-25 20:41
Modified
2025-08-02 05:18
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.
Bug Fix(es):
* Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618386)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618386)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2790", "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2790.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:18:40+00:00", "generator": { "date": "2025-08-02T05:18:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2790", "initial_release_date": "2018-09-25T20:41:13+00:00", "revision_history": [ { "date": "2018-09-25T20:41:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T20:41:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:18:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64", "product_id": "perf-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.73.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.73.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64", "product_id": "kernel-0:3.10.0-327.73.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.73.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.73.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.73.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.73.1.el7.src", "product": { "name": "kernel-0:3.10.0-327.73.1.el7.src", "product_id": "kernel-0:3.10.0-327.73.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.73.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.73.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.73.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:41:13+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2790" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.73.1.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.73.1.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.73.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2402
Vulnerability from csaf_redhat
Published
2018-08-16 06:10
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: rhvm-appliance security update
Notes
Topic
An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2402", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1614066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614066" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2402.json" } ], "title": "Red Hat Security Advisory: rhvm-appliance security update", "tracking": { "current_release_date": "2025-08-02T07:06:02+00:00", "generator": { "date": "2025-08-02T07:06:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2402", "initial_release_date": "2018-08-16T06:10:06+00:00", "revision_history": [ { "date": "2018-08-16T06:10:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T06:10:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhvm-appliance-2:4.2-20180813.0.el7.src", "product": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.src", "product_id": "rhvm-appliance-2:4.2-20180813.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm-appliance@4.2-20180813.0.el7?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "product": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "product_id": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm-appliance@4.2-20180813.0.el7?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T06:10:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T06:10:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T06:10:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2789
Vulnerability from csaf_redhat
Published
2018-09-25 20:22
Modified
2025-08-02 05:18
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1616431)
* Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1618466)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1616431)\n\n* Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1618466)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2789", "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1616431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616431" }, { "category": "external", "summary": "1618466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618466" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2789.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:18:51+00:00", "generator": { "date": "2025-08-02T05:18:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2789", "initial_release_date": "2018-09-25T20:22:24+00:00", "revision_history": [ { "date": "2018-09-25T20:22:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-25T20:22:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:18:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.39.1.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.39.1.rt56.629.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.39.1.rt56.629.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.39.1.rt56.629.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-25T20:22:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2789" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.39.1.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.39.1.rt56.629.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2403
Vulnerability from csaf_redhat
Published
2018-08-15 10:20
Modified
2025-08-02 07:05
Summary
Red Hat Security Advisory: redhat-virtualization-host security update
Notes
Topic
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2403", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1614067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614067" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2403.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host security update", "tracking": { "current_release_date": "2025-08-02T07:05:57+00:00", "generator": { "date": "2025-08-02T07:05:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2403", "initial_release_date": "2018-08-15T10:20:45+00:00", "revision_history": [ { "date": "2018-08-15T10:20:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-15T10:20:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:05:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-5.2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-5.2.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180813.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-5.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180813.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T10:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2403" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T10:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2403" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T10:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2403" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2395
Vulnerability from csaf_redhat
Published
2018-08-14 20:23
Modified
2025-08-03 19:15
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-862.10.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1594915)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.10.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1594915)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2395", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1594915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594915" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2395.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T19:15:19+00:00", "generator": { "date": "2025-08-03T19:15:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2395", "initial_release_date": "2018-08-14T20:23:19+00:00", "revision_history": [ { "date": "2018-08-14T20:23:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:23:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T19:15:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.11.6.rt56.819.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product_id": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.11.6.rt56.819.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535173" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s skcipher component, which affects the skcipher_recvmsg function. Attackers using a specific input can lead to a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, and kernel-alt packages.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and real-time kernels.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "RHBZ#1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13215", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crypto: privilege escalation in skcipher_recvmsg function" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
gsd-2018-5390
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-5390", "description": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "id": "GSD-2018-5390", "references": [ "https://www.suse.com/security/cve/CVE-2018-5390.html", "https://www.debian.org/security/2018/dsa-4266", "https://access.redhat.com/errata/RHSA-2018:2948", "https://access.redhat.com/errata/RHSA-2018:2933", "https://access.redhat.com/errata/RHSA-2018:2924", "https://access.redhat.com/errata/RHSA-2018:2791", "https://access.redhat.com/errata/RHSA-2018:2790", "https://access.redhat.com/errata/RHSA-2018:2789", "https://access.redhat.com/errata/RHSA-2018:2785", "https://access.redhat.com/errata/RHSA-2018:2776", "https://access.redhat.com/errata/RHSA-2018:2645", "https://access.redhat.com/errata/RHSA-2018:2403", "https://access.redhat.com/errata/RHSA-2018:2402", "https://access.redhat.com/errata/RHSA-2018:2395", "https://access.redhat.com/errata/RHSA-2018:2390", "https://access.redhat.com/errata/RHSA-2018:2384", "https://ubuntu.com/security/CVE-2018-5390", "https://advisories.mageia.org/CVE-2018-5390.html", "https://security.archlinux.org/CVE-2018-5390", "https://alas.aws.amazon.com/cve/html/CVE-2018-5390.html", "https://linux.oracle.com/cve/CVE-2018-5390.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-5390" ], "details": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "id": "GSD-2018-5390", "modified": "2023-12-13T01:22:40.019041Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2018-5390", "STATE": "PUBLIC", "TITLE": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux Kernel", "version": { "version_data": [ { "affected": "\u003e=", "version_name": "4.9", "version_value": "4.9" } ] } } ] }, "vendor_name": "Linux" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2785", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "name": "VU#962459", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2776", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "name": "RHSA-2018:2933", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "USN-3763-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3763-1/" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "1041434", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041434" }, { "name": "USN-3732-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3732-2/" }, { "name": "104976", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104976" }, { "name": "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "name": "1041424", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041424" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2924", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "name": "RHSA-2018:2789", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "name": "DSA-4266", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4266" }, { "name": "RHSA-2018:2645", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "name": "USN-3732-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3732-1/" }, { "name": "RHSA-2018:2791", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "name": "RHSA-2018:2790", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_41", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "name": "https://support.f5.com/csp/article/K95343321", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K95343321" }, { "name": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", "refsource": "CONFIRM", "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "name": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.18", "versionStartIncluding": "4.9", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.6.9", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.7.5", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.2.7.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartExcluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.1.0", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1.", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:network_assurance_engine:2.1\\(1a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2018-5390" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "VU#962459", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/962459" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_41", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "name": "DSA-4266", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4266" }, { "name": "USN-3732-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3732-2/" }, { "name": "USN-3732-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3732-1/" }, { "name": "1041424", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041424" }, { "name": "104976", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104976" }, { "name": "1041434", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041434" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "name": "[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "name": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack", "refsource": "CONFIRM", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "name": "20180824 Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "name": "https://support.f5.com/csp/article/K95343321", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K95343321" }, { "name": "RHSA-2018:2645", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "name": "USN-3763-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3763-1/" }, { "name": "RHSA-2018:2791", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "name": "RHSA-2018:2790", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "name": "RHSA-2018:2789", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "name": "RHSA-2018:2785", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "name": "RHSA-2018:2776", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "name": "RHSA-2018:2933", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "name": "RHSA-2018:2924", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "name": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2020-09-18T16:14Z", "publishedDate": "2018-08-06T20:29Z" } } }
cisco-sa-20180824-linux-tcp
Vulnerability from csaf_cisco
Published
2018-08-24 21:30
Modified
2018-11-06 18:09
Summary
Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018
Notes
Summary
On August 6, 2018, the Vulnerability Coordination team of the National Cyber Security Centre of Finland (NCSC-FI) and the CERT Coordination Center (CERT/CC) disclosed vulnerabilities in the TCP stacks that are used by the Linux and FreeBSD kernels. These vulnerabilities are publicly known as SegmentSmack.
The vulnerabilities could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. An attack could be executed by using low transfer rates of TCP packets, unlike typical distributed denial of service (DDoS) attacks.
The vulnerabilities are due to inefficient TCP reassembly algorithms in the TCP stacks that are used by the affected kernels. Linux Kernel Versions 4.9 and later and all supported versions of the FreeBSD kernel are known to be affected by these vulnerabilities.
An attacker could exploit these vulnerabilities by sending a stream of packets that are designed to trigger the issue in an established TCP session with an affected device. A sustained DoS condition requires the attacker to maintain a continuous stream of malicious traffic. Due to the required use of an established session, an attack cannot be performed using spoofed IP addresses.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp"]
Affected Products
Cisco investigated its product line to determine which products and services may be affected by these vulnerabilities.
The “Vulnerable Products” section of this advisory includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool ["https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.
Any product or service not listed in the “Vulnerable Products” section of this advisory is to be considered not vulnerable.
Vulnerable Products
The following table lists Cisco products that are affected by the Linux Kernel vulnerability that is described in this advisory:
Product Cisco Bug ID Fixed Release Availability Network and Content Security Devices Cisco Threat Grid Appliance M5 CSCvk69486 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk69486"] 2.5 (Oct-2018) Routing and Switching - Enterprise and Service Provider Cisco DNA Center CSCvm34581 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm34581"] 1.3 (Apr-2019) Cisco Network Assurance Engine CSCvm34702 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm34702"] 3.0(0) (Nov-2018) Voice and Unified Communications Devices Cisco Webex Hybrid Data Security Node CSCvm49456 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm49456"] Cisco will update affected systems (Nov-2018) Cisco Webex Video Mesh Node CSCvm48163 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm48163"] Cisco will update affected systems (Nov-2018) Video, Streaming, TelePresence, and Transcoding Devices Cisco Expressway Series CSCvk74922 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74922"] x12.5 (Jan-2019) Cisco Meeting Management CSCvk69487 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk69487"] 1.1.0.27 (Sept-2018) Cisco TelePresence Conductor CSCvk75754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk75754"] 4.3.4 MR (Nov-2018) Cisco TelePresence Video Communication Server (VCS) CSCvk74922 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74922"] x12.5 (Jan-2019)
The following table lists Cisco products that are affected by the FreeBSD vulnerability that is described in this advisory:
Product Cisco Bug ID Fixed Release Availability Network and Content Security Devices Cisco Content Security Management Appliance (SMA) CSCvk74266 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74266"] 12.0.0 (Nov-2018) Cisco Email Security Appliance (ESA) CSCvk74109 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74109"] 11.0.3 (Oct-2018)
12.0.0 (Nov-2018) Cisco Web Security Appliance (WSA) CSCvk74112 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74112"] 10.1.4 (Sept-2018)
10.5.3 (Oct-2018)
11.5.2 (Nov-2018)
Video, Streaming, TelePresence, and Transcoding Devices Cisco TelePresence MCU 5300 Series, MSE 8510 CSCvk74254 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74254"] 4.5(1.98) (Oct-2018) Cisco TelePresence MCU MSE 8420 CSCvk74254 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74254"] No fix expected - End of life Cisco TelePresence Server 7010 and MSE 8710 CSCvk74256 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74256"] 4.4(1.27) (Dec-2018) Cisco TelePresence Server on Multiparty Media 310, 320 and 820 CSCvk74256 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74256"] 4.4(1.27) (Dec-2018)
Products Confirmed Not Vulnerable
Only products and services listed in the “Vulnerable Products” section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following products and services:
Network and Content Security Devices
Cisco Firepower Management Center
Video, Streaming, TelePresence, and Transcoding Devices
Cisco TelePresence MCU 4200 Series and 4500 Series
Cisco TelePresence Advanced Media Gateway Series
Workarounds
Any workarounds will be documented in the product-specific Cisco bugs, which are identified in the “Vulnerable Products” section of this advisory.
It is important to note that exploitation of these vulnerabilities requires an attacker to establish a TCP three-way handshake with an open TCP port on an affected device. Customers are therefore advised to use an external firewall to allow only explicitly trusted source IP addresses to connect to open TCP ports on affected devices.
Fixed Software
For information about fixed software releases, consult the Cisco bugs identified in the “Vulnerable Products” section of this advisory.
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco TAC or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.
Source
These vulnerabilities were reported by Juha-Matti Tilli, of the Aalto University Department of Communications and Networking, and Nokia Bell Labs.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were reported by Juha-Matti Tilli, of the Aalto University Department of Communications and Networking, and Nokia Bell Labs." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On August 6, 2018, the Vulnerability Coordination team of the National Cyber Security Centre of Finland (NCSC-FI) and the CERT Coordination Center (CERT/CC) disclosed vulnerabilities in the TCP stacks that are used by the Linux and FreeBSD kernels. These vulnerabilities are publicly known as SegmentSmack.\r\n\r\nThe vulnerabilities could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. An attack could be executed by using low transfer rates of TCP packets, unlike typical distributed denial of service (DDoS) attacks.\r\n\r\nThe vulnerabilities are due to inefficient TCP reassembly algorithms in the TCP stacks that are used by the affected kernels. Linux Kernel Versions 4.9 and later and all supported versions of the FreeBSD kernel are known to be affected by these vulnerabilities.\r\n\r\nAn attacker could exploit these vulnerabilities by sending a stream of packets that are designed to trigger the issue in an established TCP session with an affected device. A sustained DoS condition requires the attacker to maintain a continuous stream of malicious traffic. Due to the required use of an established session, an attack cannot be performed using spoofed IP addresses.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp\"]", "title": "Summary" }, { "category": "general", "text": "Cisco investigated its product line to determine which products and services may be affected by these vulnerabilities.\r\n\r\nThe \u201cVulnerable Products\u201d section of this advisory includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product or service not listed in the \u201cVulnerable Products\u201d section of this advisory is to be considered not vulnerable.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products that are affected by the Linux Kernel vulnerability that is described in this advisory:\r\n Product Cisco Bug ID Fixed Release Availability Network and Content Security Devices Cisco Threat Grid Appliance M5 CSCvk69486 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk69486\"] 2.5 (Oct-2018) Routing and Switching - Enterprise and Service Provider Cisco DNA Center CSCvm34581 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm34581\"] 1.3 (Apr-2019) Cisco Network Assurance Engine CSCvm34702 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm34702\"] 3.0(0) (Nov-2018) Voice and Unified Communications Devices Cisco Webex Hybrid Data Security Node CSCvm49456 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm49456\"] Cisco will update affected systems (Nov-2018) Cisco Webex Video Mesh Node CSCvm48163 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm48163\"] Cisco will update affected systems (Nov-2018) Video, Streaming, TelePresence, and Transcoding Devices Cisco Expressway Series CSCvk74922 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74922\"] x12.5 (Jan-2019) Cisco Meeting Management CSCvk69487 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk69487\"] 1.1.0.27 (Sept-2018) Cisco TelePresence Conductor CSCvk75754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk75754\"] 4.3.4 MR (Nov-2018) Cisco TelePresence Video Communication Server (VCS) CSCvk74922 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74922\"] x12.5 (Jan-2019)\r\nThe following table lists Cisco products that are affected by the FreeBSD vulnerability that is described in this advisory:\r\n Product Cisco Bug ID Fixed Release Availability Network and Content Security Devices Cisco Content Security Management Appliance (SMA) CSCvk74266 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74266\"] 12.0.0 (Nov-2018) Cisco Email Security Appliance (ESA) CSCvk74109 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74109\"] 11.0.3 (Oct-2018)\r\n12.0.0 (Nov-2018) Cisco Web Security Appliance (WSA) CSCvk74112 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74112\"] 10.1.4 (Sept-2018)\r\n10.5.3 (Oct-2018)\r\n11.5.2 (Nov-2018)\r\n Video, Streaming, TelePresence, and Transcoding Devices Cisco TelePresence MCU 5300 Series, MSE 8510 CSCvk74254 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74254\"] 4.5(1.98) (Oct-2018) Cisco TelePresence MCU MSE 8420 CSCvk74254 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74254\"] No fix expected - End of life Cisco TelePresence Server 7010 and MSE 8710 CSCvk74256 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74256\"] 4.4(1.27) (Dec-2018) Cisco TelePresence Server on Multiparty Media 310, 320 and 820 CSCvk74256 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74256\"] 4.4(1.27) (Dec-2018)", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products and services listed in the \u201cVulnerable Products\u201d section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following products and services:\r\n Network and Content Security Devices\r\nCisco Firepower Management Center\r\nVideo, Streaming, TelePresence, and Transcoding Devices\r\nCisco TelePresence MCU 4200 Series and 4500 Series\r\nCisco TelePresence Advanced Media Gateway Series", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Any workarounds will be documented in the product-specific Cisco bugs, which are identified in the \u201cVulnerable Products\u201d section of this advisory.\r\n\r\nIt is important to note that exploitation of these vulnerabilities requires an attacker to establish a TCP three-way handshake with an open TCP port on an affected device. Customers are therefore advised to use an external firewall to allow only explicitly trusted source IP addresses to connect to open TCP ports on affected devices.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases, consult the Cisco bugs identified in the \u201cVulnerable Products\u201d section of this advisory.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco TAC or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were reported by Juha-Matti Tilli, of the Aalto University Department of Communications and Networking, and Nokia Bell Labs.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "category": "external", "summary": "Cisco Bug Search Tool", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID" }, { "category": "external", "summary": "CSCvk69486", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk69486" }, { "category": "external", "summary": "CSCvm34581", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm34581" }, { "category": "external", "summary": "CSCvm34702", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm34702" }, { "category": "external", "summary": "CSCvm49456", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm49456" }, { "category": "external", "summary": "CSCvm48163", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm48163" }, { "category": "external", "summary": "CSCvk74922", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74922" }, { "category": "external", "summary": "CSCvk69487", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk69487" }, { "category": "external", "summary": "CSCvk75754", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk75754" }, { "category": "external", "summary": "CSCvk74922", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74922" }, { "category": "external", "summary": "CSCvk74266", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74266" }, { "category": "external", "summary": "CSCvk74109", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74109" }, { "category": "external", "summary": "CSCvk74112", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74112" }, { "category": "external", "summary": "CSCvk74254", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74254" }, { "category": "external", "summary": "CSCvk74254", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74254" }, { "category": "external", "summary": "CSCvk74256", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74256" }, { "category": "external", "summary": "CSCvk74256", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk74256" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018", "tracking": { "current_release_date": "2018-11-06T18:09:00+00:00", "generator": { "date": "2022-10-22T03:01:18+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-20180824-linux-tcp", "initial_release_date": "2018-08-24T21:30:00+00:00", "revision_history": [ { "date": "2018-08-24T21:31:51+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2018-08-29T17:26:00+00:00", "number": "1.1.0", "summary": "Updated the lists of products under investigation and products confirmed not vulnerable. \tUpdated information about fixed release availability." }, { "date": "2018-08-30T16:55:21+00:00", "number": "1.2.0", "summary": "Updated information about fixed release availability." }, { "date": "2018-09-04T18:05:25+00:00", "number": "1.3.0", "summary": "Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability." }, { "date": "2018-09-06T18:15:43+00:00", "number": "1.4.0", "summary": "Updated the lists of products under investigation and vulnerable products. Updated information about fixed release availability." }, { "date": "2018-09-13T18:32:47+00:00", "number": "1.5.0", "summary": "Updated the lists of products under investigation. Moved Firepower Management Center to the products confirmed not vulnerable as after further evaluation, no publicly available software releases were found to be vulnerable." }, { "date": "2018-09-17T20:47:03+00:00", "number": "1.6.0", "summary": "Updated the lists of products under investigation and vulnerable products." }, { "date": "2018-11-06T18:09:30+00:00", "number": "1.7.0", "summary": "Updated information about fixed release availability. Removed references to ongoing investigation." } ], "status": "final", "version": "1.7.0" } }, "vulnerabilities": [ { "cve": "CVE-2018-5390", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-08-07T16:54:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Linux Kernel TCP Reassembly Algorithm Remote Denial of Service Vulnerability" }, { "cve": "CVE-2018-6922", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-08-20T11:26:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "FreeBSD TCP Reassembly Denial of Service Vulnerability" } ] }
fkie_cve-2018-5390
Vulnerability from fkie_nvd
Published
2018-08-06 20:29
Modified
2024-11-21 04:08
Severity ?
Summary
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt | Third Party Advisory | |
cret@cert.org | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en | Third Party Advisory | |
cret@cert.org | http://www.openwall.com/lists/oss-security/2019/06/28/2 | Mailing List, Third Party Advisory | |
cret@cert.org | http://www.openwall.com/lists/oss-security/2019/07/06/3 | Mailing List, Third Party Advisory | |
cret@cert.org | http://www.openwall.com/lists/oss-security/2019/07/06/4 | Mailing List, Third Party Advisory | |
cret@cert.org | http://www.securityfocus.com/bid/104976 | Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.securitytracker.com/id/1041424 | Third Party Advisory, VDB Entry | |
cret@cert.org | http://www.securitytracker.com/id/1041434 | Third Party Advisory, VDB Entry | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2384 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2395 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2402 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2403 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2645 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2776 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2785 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2789 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2790 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2791 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2924 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2933 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory | |
cret@cert.org | https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf | Third Party Advisory | |
cret@cert.org | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e | Patch, Vendor Advisory | |
cret@cert.org | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
cret@cert.org | https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html | Third Party Advisory | |
cret@cert.org | https://security.netapp.com/advisory/ntap-20180815-0003/ | Third Party Advisory | |
cret@cert.org | https://support.f5.com/csp/article/K95343321 | Third Party Advisory | |
cret@cert.org | https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS | ||
cret@cert.org | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3732-1/ | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3732-2/ | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3741-1/ | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3741-2/ | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3742-1/ | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3742-2/ | Third Party Advisory | |
cret@cert.org | https://usn.ubuntu.com/3763-1/ | Third Party Advisory | |
cret@cert.org | https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack | Mitigation, Third Party Advisory | |
cret@cert.org | https://www.debian.org/security/2018/dsa-4266 | Third Party Advisory | |
cret@cert.org | https://www.kb.cert.org/vuls/id/962459 | Third Party Advisory, US Government Resource | |
cret@cert.org | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
cret@cert.org | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Patch, Third Party Advisory | |
cret@cert.org | https://www.synology.com/support/security/Synology_SA_18_41 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/06/28/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/07/06/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/07/06/4 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104976 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041424 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041434 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2384 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2395 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2402 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2403 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2645 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2776 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2785 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2789 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2790 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2791 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2924 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2933 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180815-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K95343321 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3732-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3732-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3741-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3741-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3742-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3742-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3763-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4266 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/962459 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_41 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | virtualization | 4.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 6.4 | |
redhat | enterprise_linux_server_aus | 6.5 | |
redhat | enterprise_linux_server_aus | 6.6 | |
redhat | enterprise_linux_server_aus | 7.2 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_eus | 6.4 | |
redhat | enterprise_linux_server_eus | 6.7 | |
redhat | enterprise_linux_server_eus | 7.2 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_tus | 6.6 | |
redhat | enterprise_linux_server_tus | 7.2 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_workstation | 7.0 | |
linux | linux_kernel | * | |
linux | linux_kernel | 4.18 | |
linux | linux_kernel | 4.18 | |
linux | linux_kernel | 4.18 | |
linux | linux_kernel | 4.18 | |
linux | linux_kernel | 4.18 | |
linux | linux_kernel | 4.18 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
hp | aruba_airwave_amp | * | |
hp | aruba_clearpass_policy_manager | * | |
hp | aruba_clearpass_policy_manager | * | |
f5 | big-ip_access_policy_manager | * | |
f5 | big-ip_access_policy_manager | * | |
f5 | big-ip_access_policy_manager | * | |
f5 | big-ip_access_policy_manager | 14.0.0 | |
f5 | big-ip_advanced_firewall_manager | * | |
f5 | big-ip_advanced_firewall_manager | * | |
f5 | big-ip_advanced_firewall_manager | * | |
f5 | big-ip_advanced_firewall_manager | 14.0.0 | |
f5 | big-ip_analytics | * | |
f5 | big-ip_analytics | * | |
f5 | big-ip_analytics | * | |
f5 | big-ip_analytics | 14.0.0 | |
f5 | big-ip_application_acceleration_manager | * | |
f5 | big-ip_application_acceleration_manager | * | |
f5 | big-ip_application_acceleration_manager | * | |
f5 | big-ip_application_acceleration_manager | 14.0.0 | |
f5 | big-ip_application_security_manager | * | |
f5 | big-ip_application_security_manager | * | |
f5 | big-ip_application_security_manager | * | |
f5 | big-ip_application_security_manager | 14.0.0 | |
f5 | big-ip_domain_name_system | * | |
f5 | big-ip_domain_name_system | * | |
f5 | big-ip_domain_name_system | * | |
f5 | big-ip_domain_name_system | 14.0.0 | |
f5 | big-ip_edge_gateway | * | |
f5 | big-ip_edge_gateway | * | |
f5 | big-ip_edge_gateway | * | |
f5 | big-ip_edge_gateway | 14.0.0 | |
f5 | big-ip_fraud_protection_service | * | |
f5 | big-ip_fraud_protection_service | * | |
f5 | big-ip_fraud_protection_service | * | |
f5 | big-ip_fraud_protection_service | 14.0.0 | |
f5 | big-ip_global_traffic_manager | * | |
f5 | big-ip_global_traffic_manager | * | |
f5 | big-ip_global_traffic_manager | * | |
f5 | big-ip_global_traffic_manager | 14.0.0 | |
f5 | big-ip_link_controller | * | |
f5 | big-ip_link_controller | * | |
f5 | big-ip_link_controller | * | |
f5 | big-ip_link_controller | 14.0.0 | |
f5 | big-ip_local_traffic_manager | * | |
f5 | big-ip_local_traffic_manager | * | |
f5 | big-ip_local_traffic_manager | * | |
f5 | big-ip_local_traffic_manager | 14.0.0 | |
f5 | big-ip_policy_enforcement_manager | * | |
f5 | big-ip_policy_enforcement_manager | * | |
f5 | big-ip_policy_enforcement_manager | * | |
f5 | big-ip_policy_enforcement_manager | 14.0.0 | |
f5 | big-ip_webaccelerator | * | |
f5 | big-ip_webaccelerator | * | |
f5 | big-ip_webaccelerator | * | |
f5 | big-ip_webaccelerator | 14.0.0 | |
f5 | traffix_systems_signaling_delivery_controller | * | |
f5 | traffix_systems_signaling_delivery_controller | 4.4.0 | |
a10networks | advanced_core_operating_system | 3.2.2 | |
a10networks | advanced_core_operating_system | 3.2.2 | |
a10networks | advanced_core_operating_system | 4.1.0 | |
a10networks | advanced_core_operating_system | 4.1.0 | |
a10networks | advanced_core_operating_system | 4.1.1 | |
a10networks | advanced_core_operating_system | 4.1.2 | |
a10networks | advanced_core_operating_system | 4.1.2 | |
a10networks | advanced_core_operating_system | 4.1.4 | |
a10networks | advanced_core_operating_system | 4.1.4 | |
cisco | collaboration_meeting_rooms | 1.0 | |
cisco | digital_network_architecture_center | 1.2 | |
cisco | expressway | x8.10 | |
cisco | expressway | x8.10.1 | |
cisco | expressway | x8.10.2 | |
cisco | expressway | x8.10.3 | |
cisco | expressway | x8.10.4 | |
cisco | expressway | x8.11 | |
cisco | expressway_series | - | |
cisco | meeting_management | 1.0 | |
cisco | meeting_management | 1.0.1 | |
cisco | network_assurance_engine | 2.1\(1a\) | |
cisco | threat_grid-cloud | - | |
cisco | webex_hybrid_data_security | - | |
cisco | webex_video_mesh | - | |
cisco | telepresence_video_communication_server_firmware | x8.10 | |
cisco | telepresence_video_communication_server_firmware | x8.10.1 | |
cisco | telepresence_video_communication_server_firmware | x8.10.2 | |
cisco | telepresence_video_communication_server_firmware | x8.10.3 | |
cisco | telepresence_video_communication_server_firmware | x8.10.4 | |
cisco | telepresence_video_communication_server_firmware | x8.11 | |
cisco | telepresence_video_communication_server | - | |
cisco | telepresence_conductor_firmware | xc4.3 | |
cisco | telepresence_conductor_firmware | xc4.3.1 | |
cisco | telepresence_conductor_firmware | xc4.3.2 | |
cisco | telepresence_conductor_firmware | xc4.3.3 | |
cisco | telepresence_conductor_firmware | xc4.3.4 | |
cisco | telepresence_conductor | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "2EDC8561-5E0A-4692-BB71-C88ED7A1229F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6E2A48A-1AFB-4878-AE78-18613DE9334F", "versionEndExcluding": "4.18", "versionStartIncluding": "4.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "0758920B-F8FC-44AB-92E3-CB0B0A5EDA76", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "81EBA79F-0ABF-4213-8BEF-9A927F9E24D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*", "matchCriteriaId": "364BE028-0C54-4254-9261-59D97C0EDC1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*", "matchCriteriaId": "C5CD0194-46B1-4CCC-9829-8ED014B77660", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "matchCriteriaId": "DB2B91AF-ACE1-4F6F-B2D0-9D4B7D8D20CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "matchCriteriaId": "30FBD992-DD41-441E-A6C7-D39DAC45DA34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A3E8408-DE01-4B3C-9FDF-A51261C524BD", "versionEndExcluding": "8.2.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E49DB15-06E7-4709-933E-890A7E65A240", "versionEndIncluding": "6.6.9", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A29A8C01-7E4E-4662-B4F3-07DEF07CC600", "versionEndIncluding": "6.7.5", "versionStartIncluding": "6.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "41E6AF24-0676-4B70-A289-7B81321194DF", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BB42D3A-71EE-4367-9F65-86404D74E59D", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1331467F-B278-485E-AD91-7D0643C2F3DB", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "44E8F4B6-ACF1-4F2C-A2A4-DF7382CCE628", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "195704A8-4911-4A61-8369-711D403052F1", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5011C2D-FBB5-4117-BB97-11DE70117345", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E866C4E5-D739-4352-9B6D-9753B4C78A24", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D1FDA72E-991D-4451-9C8E-E738F4D12728", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDE5A2D0-C268-4D2D-A001-AEC17E92B1DA", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "79344F94-2CB8-4F08-9373-61614A38476C", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "42D16634-442B-4674-B11E-6748D28764BD", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "622C877B-760A-4C50-9FDF-998C010B864E", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FA10863-C4C8-4658-8EEA-BC71B3522F36", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D00EED-F95D-4458-BDC4-3390DE85348B", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D91EC11-DD9A-434B-9EB4-14AA0E977D8D", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "292EC144-CBA2-4275-9F70-4ED65A505B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6EC3436-7FAE-4311-8103-7ADBAF40E1C1", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "397AC4A5-B67C-483B-84F7-8CB294BB460C", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E697E4FD-1882-4BF8-9B9F-FB7DFD19497B", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "80509490-50DA-42F8-8A4A-A6F6B95649BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A39E28-E7BB-47A3-988B-4EBF070D3538", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "1466F808-2596-4028-8884-27EDD5CACB47", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "394DF290-9328-4FAD-B04E-61F62B916148", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7BBEC67-BD2E-49D5-8294-977D975D98D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D931BC21-AF80-400C-A7E9-2C4AB19D748A", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1.", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A11E433-943D-4D92-B45E-3FA268094278", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "96AA67E0-3471-4699-87A7-E47DD8E313B8", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB76D898-4C7C-40E9-8539-E2A1BC7A5A66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C3C9586-D4ED-4486-9C1F-B357F34F8A84", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4C3D6F5-D94D-46A3-991C-A11275B59F8E", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "6114B091-1612-4EA2-81D4-2E5455A345F7", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "86D68F26-EF89-4016-BD3A-637951752AAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F002114-483A-462C-B0BD-4E1591009935", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "57CCB85A-6F90-4DB7-B0F8-AE5250E1DCFE", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "36F60067-2623-42F9-8B4F-C24F3268DDB9", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ADAD6E9A-F8B5-4B2D-B687-AEAB518B8F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DE3443E-9D07-4A82-B110-02ADDA9FDEF3", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "60189636-02D6-44CA-BE2A-7777E3C409CD", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "68E2840B-96F4-4437-91D1-4AFE99E54D6A", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "23E592A7-B530-4932-A81D-D1B9ABD64047", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D08BA8F-4949-47EC-8EEF-312DC70043B8", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "47D07AA7-1E0E-4FC3-B8BF-05729619B0AA", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A197CF35-47EE-4DAE-BC51-90663870B9B9", "versionEndIncluding": "13.1.1", "versionStartExcluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E734E1C-A92F-4394-8F33-4429161BE47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C9A0A9D-40AF-46DC-B577-DA73B4C2970B", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AD75094-3248-4D37-969E-75272F6F31D6", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "15F4D416-10F4-4C08-A25D-0795F7FE0FBE", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CF10213-FBE4-47A5-8EF2-B45BF15BEB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "A36B6B7D-3900-43D4-B241-E58A1377B4DF", "versionEndIncluding": "11.6.3", "versionStartIncluding": "11.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7860523-E8B3-4BEE-853A-6F0B5BCDDA5A", "versionEndIncluding": "12.1.3", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6944128-3A30-4835-A125-3EA7571D7DC0", "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5A85C15-B821-4992-9B06-45767E7467D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "A87510FE-775A-44FB-9792-074CD5DE5C38", "versionEndIncluding": "5.1.0", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B5497D9-9022-4788-87DB-6C4B4116509A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BB85F4D0-A104-4954-8D73-B9980C8E93E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*", "matchCriteriaId": "CECB4DA3-3842-4102-8451-43EC00CBAEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D286AC5-DB3E-4FAE-8441-A4D98B1F1160", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*", "matchCriteriaId": "8DE427D5-6E9A-4AC3-830D-7D235DE97389", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*", "matchCriteriaId": "F32591D5-D7F6-4C45-B1B5-1D1F8C649DF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "032B2E4E-381E-4662-A6CF-8FA517233681", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*", "matchCriteriaId": "BA708DD0-8A88-4B2B-9B57-A08491DE4696", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0013CA3E-0E73-45EA-B2E9-7EA038BAB336", "vulnerable": true }, { "criteria": "cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*", "matchCriteriaId": "F993C993-D118-45A3-9F95-382B54E25439", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E53CEDB-F536-4DA0-917C-C220A3102B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "27A026D0-AA0D-417A-A06B-8785E5FFCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*", "matchCriteriaId": "31DF55CF-FEDE-43DE-8F55-3264DB7CDD71", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A4C837B-4648-4764-B190-36381EE7E664", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "F044DA47-D8FA-4EF9-B28C-C69D0DE8C3DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "E600BCEC-2466-4348-ACE3-955469AA1C9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "AB8DD876-7E51-43A9-8944-B4DEE9E9EDD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*", "matchCriteriaId": "431A3000-D903-4B57-9B54-CC650105B044", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8E7428A-D2A5-4B77-8562-F75BB8C72976", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "84E53549-337C-423F-AB34-F2559C1F225C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EABDA6F4-99E7-4354-9760-E9891B47DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_assurance_engine:2.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD40D143-B4B4-4C2A-8D9E-D928459FC59E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2B5B87A-CECF-48BF-833E-6E4A6DF647CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A108A5-ADB1-4328-B3C0-9C3CC2CD1346", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE0F9723-F9BD-422D-8414-040C01C9C0D0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B534882-60A5-4098-A439-A47CBC546E53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB1C3395-1865-4436-81E0-3821B5BB99D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "86ACAFA3-7F76-428A-A6EE-87284FB30B01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "8908328C-FC17-4BDC-B369-36942225DFAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "988EDFD9-4652-4460-BE48-62219B8A0A6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD9DD18A-43B9-4B43-AF9F-236D42651E46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "177FA398-F812-4E8D-99A3-3F7E0F690CE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A8F173C-2D38-42B2-B86F-72B53A96D05D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "27E03126-0FF6-4D4E-8766-A4F0B20741AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F24CB2EC-A79E-4C56-8F03-86D53A9B28A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C4F2333B-BE03-4D6C-AA16-1E3EB170496E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B199BF45-F9EF-49A0-B2D5-9B9FA6AA1208", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C65475E-2641-404B-8316-6B6A5029617D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service." }, { "lang": "es", "value": "El kernel de Linux en versiones 4.9 y siguientes pueden forzarse a realizar llamadas muy caras a tcp_collapse_ofo_queue() y tcp_prune_ofo_queue() para cada paquete entrante, lo que puede conducir a una denegaci\u00f3n de servicio." } ], "id": "CVE-2018-5390", "lastModified": "2024-11-21T04:08:43.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-06T20:29:01.570", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104976" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041424" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041434" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K95343321" }, { "source": "cret@cert.org", "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3732-1/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3732-2/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3763-1/" }, { "source": "cret@cert.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4266" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/962459" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cret@cert.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/07/06/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K95343321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K95343321?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3732-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3732-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3763-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/962459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_41" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…